ISRC CyberTrivia

ISRC CyberTrivia

University

12 Qs

quiz-placeholder

Similar activities

Quiz IT Audit 7 Gabungan

Quiz IT Audit 7 Gabungan

University

10 Qs

BB

BB

University

10 Qs

Tree and Planar Graph

Tree and Planar Graph

University

10 Qs

CodeMonkey for B.Ed IT

CodeMonkey for B.Ed IT

University

10 Qs

Computational Thinking in Python[Quiz 3]

Computational Thinking in Python[Quiz 3]

University

15 Qs

JRB2 Quiz 4

JRB2 Quiz 4

University

10 Qs

Understanding Email, Contacts and Calendaring

Understanding Email, Contacts and Calendaring

University

10 Qs

ICT 0513 - Chapter 4 : System Unit

ICT 0513 - Chapter 4 : System Unit

University

15 Qs

ISRC CyberTrivia

ISRC CyberTrivia

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Melissa Paramo

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the default port for telnet?

21

23

25

161

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What MultiFactor Authenticator is currently in use?

Microsoft

Jimmy

Google

DUO

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The NIST Cybersecurity Framework has 5 functions. Which one is missing from the following list: Identify, Protect, Detect, Recover

Observe

Orient

Blame

Respond

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You have received an email stating your company account has been suspended pending a verification. The sender address is security@magma-security.com.

What should you do?

Click on the link to verify the account.

Click the phishing button on your email client

Call the number on the email

Reply to the email

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Order the wifi encryption from LEAST to MOST secure

WPA, WEP2,WAP2,WAP3

WEP,WEP2,WPA,WPA2

WEP,WPA,WPA2,WPA3

WPA,WPE,WPA2,WPA3

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An email claiming that you have won the lottery, as long as you fill out the corresponding information, is an example of what type social engineering attack?

Baiting

Piggybacking

Phishing

Spinning

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is piggybacking?

Following employees into restricted areas

Sending legitimate emails to people

Create a pretext to gain information

Dumpster diving

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?