Neta Quiz 1

Neta Quiz 1

11th Grade

10 Qs

quiz-placeholder

Similar activities

keamanan jaringan komputer

keamanan jaringan komputer

11th Grade

15 Qs

Digital Security

Digital Security

9th - 12th Grade

10 Qs

J277 1.4 Network Security Quiz (Forms of Attack)

J277 1.4 Network Security Quiz (Forms of Attack)

9th - 12th Grade

13 Qs

Hackers

Hackers

9th - 12th Grade

10 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

ICT

ICT

9th - 11th Grade

15 Qs

DETECTING AND PREVENTING CYBER SECURITY THREATS

DETECTING AND PREVENTING CYBER SECURITY THREATS

9th - 12th Grade

15 Qs

Cybersecurity Online Threats

Cybersecurity Online Threats

9th - 12th Grade

12 Qs

Neta Quiz 1

Neta Quiz 1

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Geok Soon Sia

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

ping sweep

DoS

spoof

DDoS

2.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What does the term vulnerability mean?

a known target or victim machine

a weakness that makes a target susceptible to an attack

a potential threat that a hacker creates

a computer that contains sensitive information

a method of attack to exploit a target

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

Protect and Defend

Securely Provision

Oversight and Development

Analyze

4.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Thwarting cyber criminals includes which of the following? (Choose two.)

hiring hackers

shutting down the network

sharing cyber Intelligence information

establishing early warning systems

5.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

DDoS

exhaustion

APT

algorithm

6.

MULTIPLE SELECT QUESTION

45 sec • 5 pts

Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

food

employment

medical

flight

education

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What name is given to a amateur hacker?

script kiddie

blue team

red hat

black hat

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?