ISRC CyberTrivia

ISRC CyberTrivia

University

12 Qs

quiz-placeholder

Similar activities

Social Engineering

Social Engineering

University

9 Qs

علوم وأنظمة التشفير

علوم وأنظمة التشفير

5th Grade - University

12 Qs

Jarkom F

Jarkom F

University

10 Qs

Wireless Networks

Wireless Networks

11th Grade - University

10 Qs

Quiz - Keamanan Jaringan Nirkabel

Quiz - Keamanan Jaringan Nirkabel

University

10 Qs

مراجعة الوحدة الثانية : أمن البيانات والمعلومات والانترنت

مراجعة الوحدة الثانية : أمن البيانات والمعلومات والانترنت

University

10 Qs

Chapter 4 - Social Engineering

Chapter 4 - Social Engineering

University

15 Qs

Quiz Konfigurasi WLAN Mikrotik

Quiz Konfigurasi WLAN Mikrotik

11th Grade - University

14 Qs

ISRC CyberTrivia

ISRC CyberTrivia

Assessment

Quiz

Computers

University

Medium

Created by

Melissa Paramo

Used 3+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the default port for telnet?

21

23

25

161

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What MultiFactor Authenticator is currently in use?

Microsoft

Jimmy

Google

DUO

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The NIST Cybersecurity Framework has 5 functions. Which one is missing from the following list: Identify, Protect, Detect, Recover

Observe

Orient

Blame

Respond

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You have received an email stating your company account has been suspended pending a verification. The sender address is security@magma-security.com.

What should you do?

Click on the link to verify the account.

Click the phishing button on your email client

Call the number on the email

Reply to the email

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Order the wifi encryption from LEAST to MOST secure

WPA, WEP2,WAP2,WAP3

WEP,WEP2,WPA,WPA2

WEP,WPA,WPA2,WPA3

WPA,WPE,WPA2,WPA3

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An email claiming that you have won the lottery, as long as you fill out the corresponding information, is an example of what type social engineering attack?

Baiting

Piggybacking

Phishing

Spinning

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is piggybacking?

Following employees into restricted areas

Sending legitimate emails to people

Create a pretext to gain information

Dumpster diving

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?