Cybersecurity Fundamentals

Cybersecurity Fundamentals

Professional Development

20 Qs

quiz-placeholder

Similar activities

Cyber Security Awareness

Cyber Security Awareness

Professional Development

15 Qs

BCS Network Security Test 2

BCS Network Security Test 2

University - Professional Development

18 Qs

Latihan Soal MQBC 2021 - Level 2

Latihan Soal MQBC 2021 - Level 2

Professional Development

15 Qs

Cyber Security Month 2019

Cyber Security Month 2019

KG - Professional Development

20 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

Chapter 13: Security Quiz

Chapter 13: Security Quiz

Professional Development

23 Qs

CYSA day 4

CYSA day 4

Professional Development

17 Qs

RCP EXTRA 3DS (ÚLTIMA OPORTUNIDADE)

RCP EXTRA 3DS (ÚLTIMA OPORTUNIDADE)

Professional Development

15 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Assessment

Quiz

Education

Professional Development

Hard

Created by

TDX Facilitator

Used 8+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The presence of a weakness in a system, program, or network is referred to as a:

vulnerability

exploit

adware

malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true about the trojans?

Trojans spread throughout the network without user intervention

Trojans conceal themselves by convincing users that it is a legitimate file.

Trojans encrypt user files and documents and demand payment to decrypt them.

Trojans display ads on web browser screens.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT an example of a Social Engineering threat:

Spear Phishing

Vishing

Whaling

Denial of Service (DoS)

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the typical attributes of a spear phishing attack? (Choose two)

Focused & personalized

Uses email spoofing techniques

Large number of recipients (Mass spam)

Smaller number of recipients

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Phishing technique relies of phone audio interactions to conduct further social engineering?

Vishing

Smishing

Whaling

Spear Phishing

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are some ways to identify potential phishing emails: (Select all that apply)

Spelling & grammar mistakes

Suspicious links or attachments

Threatening language with demands

Unexpected request for personal information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cyber attack attempts to intercept data between sender(s) & recipients(s)?

Denial of Service

Man in the Middle

Ransomware

Brute Force

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?