Cybersecurity 104

Cybersecurity 104

University

30 Qs

quiz-placeholder

Similar activities

UJIAN AKHIR SEMESTER ELEKTRONIKA DAYA

UJIAN AKHIR SEMESTER ELEKTRONIKA DAYA

University

25 Qs

Friday Fun 2023

Friday Fun 2023

University

25 Qs

Eval InnovaTec1

Eval InnovaTec1

University

25 Qs

Primary 3 Computing Term 2 Assessment

Primary 3 Computing Term 2 Assessment

3rd Grade - University

25 Qs

PARAMETER PEMOTONGAN MESIN CNC

PARAMETER PEMOTONGAN MESIN CNC

University

25 Qs

konsepp desain

konsepp desain

University

25 Qs

Educ 3: Midterm Examination (BEED & BSIED-2nd year)

Educ 3: Midterm Examination (BEED & BSIED-2nd year)

University

25 Qs

MANAJEMEN PERAWATAN

MANAJEMEN PERAWATAN

University

25 Qs

Cybersecurity 104

Cybersecurity 104

Assessment

Quiz

Instructional Technology

University

Practice Problem

Medium

Created by

Paul Pesce

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A targeted email attack sent to Sara, the company's Chief Executive Officer (CEO), is known as which of the following?

Whaling

Bluesnarfing

Vishing

Dumpster diving

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Employee badges are encoded with a private encryption key and specific personal information. The encoding is then used to provide access to the network. Which of the following describes this access control type?

Smartcard

Token

Discretionary access control

Mandatory access control

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator is observing congestion on the firewall interfaces and a high number of half open incoming connections from different external IP addresses. Which of the following attack types is underway?

Cross-site scripting

SPIM

Client-side

DDoS

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee is granted access to only areas of a network folder needed to perform their job. Which of the following describes this form of access control?

Separation of duties

Time of day restrictions

Implicit deny

Least privilege

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A username provides which of the following?

Biometrics

Identification

Authorization

Authentication

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security administrator has just finished creating a hot site for the company. This implementation relates to which of the following concepts?

Confidentiality

Succession planning

Integrity

Availability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of multifactor authentication?

Credit card and PIN

Username and password

Password and PIN

Fingerprint and retina scan

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?