ISRC CyberTrivia

ISRC CyberTrivia

University

12 Qs

quiz-placeholder

Similar activities

CompTIA A+

CompTIA A+

University

10 Qs

Email Basics

Email Basics

10th Grade - Professional Development

10 Qs

Unit 3 - 4.1.2 Wireless Devices

Unit 3 - 4.1.2 Wireless Devices

9th Grade - University

10 Qs

802.11 Architecture

802.11 Architecture

University

10 Qs

Understanding Network Encryption

Understanding Network Encryption

University

9 Qs

220-1001 Additional Questions 1

220-1001 Additional Questions 1

University

10 Qs

علوم وأنظمة التشفير

علوم وأنظمة التشفير

5th Grade - University

12 Qs

wesoły quiz kompetencje e13 [SERIO FAJEN! :>]

wesoły quiz kompetencje e13 [SERIO FAJEN! :>]

11th Grade - Professional Development

12 Qs

ISRC CyberTrivia

ISRC CyberTrivia

Assessment

Quiz

Computers

University

Medium

Created by

Melissa Paramo

Used 3+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the default port for telnet?

21

23

25

161

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What MultiFactor Authenticator is currently in use?

Microsoft

Jimmy

Google

DUO

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The NIST Cybersecurity Framework has 5 functions. Which one is missing from the following list: Identify, Protect, Detect, Recover

Observe

Orient

Blame

Respond

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

You have received an email stating your company account has been suspended pending a verification. The sender address is security@magma-security.com.

What should you do?

Click on the link to verify the account.

Click the phishing button on your email client

Call the number on the email

Reply to the email

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Order the wifi encryption from LEAST to MOST secure

WPA, WEP2,WAP2,WAP3

WEP,WEP2,WPA,WPA2

WEP,WPA,WPA2,WPA3

WPA,WPE,WPA2,WPA3

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An email claiming that you have won the lottery, as long as you fill out the corresponding information, is an example of what type social engineering attack?

Baiting

Piggybacking

Phishing

Spinning

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is piggybacking?

Following employees into restricted areas

Sending legitimate emails to people

Create a pretext to gain information

Dumpster diving

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?