What is the difference between "http://" (without the "s") and "http://" (with the "s") at
the beginning of a URL?
Cyber Security Camp
Quiz
•
Computers
•
Professional Development
•
Hard
ASKI khanzaindonesia
Used 16+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
What is the difference between "http://" (without the "s") and "http://" (with the "s") at
the beginning of a URL?
That information entered into the site is encrypted
That the site has special high definition
That the site is not accessible to certain computers
That the site is the newest version available
2.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Which of the following is a "phishing" attack example?
Sending a text message to someone that contains a malicious link disguised as a
notification that they have won a contest
Sending someone an email with a harmful link disguised as an email from someone
they know
Sending someone an email with a harmful link disguised as an email from someone
they know
All of the above
3.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Which of the following options is the best for securing your router?
Disable remote management on your router
Once the router is configured, log out as the administrator.
Change the router’s default name and password
All of the above.
4.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Large corporations are the only ones targeted by cybercriminals. Is this statement true
or false?
True
False
5.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Which option is the best for determining who in a company should be in charge of
cybersecurity?
They are in the best position to understand and promote cybersecurity within a
company, IT specialists are the finest candidates.
Owners of a company They are the ones that run the company, so they must be
familiar with cybersecurity fundamentals and put them into practice in order to
lower the danger of a cyberattack.
To lessen the danger of cyber assaults, all employees should have a basic
understanding of cybersecurity
Managers, because they are in charge of ensuring that employees follow the proper
procedures.
6.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
A networked group of computers used by hackers to steal information is referred to as
a...?
DDoS
Operating system
Botnet
Rootkit
7.
MULTIPLE CHOICE QUESTION
1 min • 10 pts
Which of the four passwords listed below is the most secure?
PWh!5B
234560
Goat123
info*49
15 questions
AI Cybersecurity Quiz
Quiz
•
Professional Development
10 questions
IT ENGLISH: Research Project Topics - Computer Ethics
Quiz
•
Professional Development
10 questions
Network+ Quiz 1
Quiz
•
Professional Development
10 questions
Network Attack Indicators
Quiz
•
Professional Development
10 questions
Operation Reliability
Quiz
•
Professional Development
10 questions
11142020_A+_Lesson_9_Quiz
Quiz
•
Professional Development
15 questions
Google Cloud Digital Leader - common knowledge sort of
Quiz
•
Professional Development
15 questions
QUIZZ 2 AIJ XII TKJ
Quiz
•
Professional Development
15 questions
Character Analysis
Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing
Quiz
•
9th - 12th Grade
10 questions
American Flag
Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension
Quiz
•
5th Grade
30 questions
Linear Inequalities
Quiz
•
9th - 12th Grade
20 questions
Types of Credit
Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25
Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers
Quiz
•
6th - 8th Grade