1.3 - Surveying the Cyberspace
Quiz
•
Computers
•
University
•
Practice Problem
•
Hard
Aviciena Santoso
Used 4+ times
FREE Resource
Enhance your content in a minute
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Man in the middle
Packet sniffing
Social engineering
Malware attacks
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker, pretending to be a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link.
Whaling
Fishing attack
Code injection
Phishing attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A common cyberattack where malicious software executes unauthorized actions on the victim’s system.
Code injection
Malware attacks
Lack of segregation
Default credentials
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This attack uses trial-and-error to guess login info, encryption keys, or to find a hidden web page.
Brute force attack
Trial and error attack
Password reuse attack
Encryption attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these vulnerabilities in a database happens when a user can access the information of another user with the same login credentials?
Default credentials
Unpatched database
Lack of authentication
Lack of segregation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following vulnerabilities in a database occurs when the developer does not configure a production database after creating it?
Default components and values
Default credentials
Failed configurations
Unpatched database
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users inundated with requirements to supply complex passwords to different systems often resort to reusing the same password across multiple accounts so that they can easily manage their credentials. This leads to which of the following vulnerabilities?
Faulty sessions
Identity theft
Credential reuse
Need a secretary to manage all my passwords
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Algorithm analysis: divide & conquer theory
Quiz
•
University
13 questions
Five Nights At Freddy's: Security Breach Quiz
Quiz
•
KG - Professional Dev...
15 questions
Firewall and Network Security
Quiz
•
University
10 questions
Information systems concepts
Quiz
•
University
18 questions
PBO Inheritance Episode 2
Quiz
•
University
13 questions
L1 - Computer Networks
Quiz
•
University
15 questions
DBC CHAPTER 3 - REVISION
Quiz
•
University
15 questions
4.6.4 Logic Gates
Quiz
•
10th Grade - Professi...
Popular Resources on Wayground
10 questions
Forest Self-Management
Lesson
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
30 questions
Thanksgiving Trivia
Quiz
•
9th - 12th Grade
30 questions
Thanksgiving Trivia
Quiz
•
6th Grade
11 questions
Would You Rather - Thanksgiving
Lesson
•
KG - 12th Grade
48 questions
The Eagle Way
Quiz
•
6th Grade
10 questions
Identifying equations
Quiz
•
KG - University
10 questions
Thanksgiving
Lesson
•
5th - 7th Grade
Discover more resources for Computers
10 questions
Identifying equations
Quiz
•
KG - University
7 questions
Different Types of Energy
Interactive video
•
4th Grade - University
20 questions
HS2C2 AB QUIZIZZ
Quiz
•
1st Grade - Professio...
14 questions
Homonyms Quiz
Quiz
•
KG - University
16 questions
Parts of a Parabola
Quiz
•
8th Grade - University
10 questions
A Brief History of Geologic Time
Interactive video
•
11th Grade - University
15 questions
Black Friday/Cyber Monday
Quiz
•
9th Grade - University
7 questions
Biomolecules (Updated)
Interactive video
•
11th Grade - University
