Cybersecurity April 2023

Cybersecurity April 2023

Professional Development

15 Qs

quiz-placeholder

Similar activities

Classic video Games

Classic video Games

Professional Development

10 Qs

Workshop Manajemen Risiko dan CSM

Workshop Manajemen Risiko dan CSM

Professional Development

10 Qs

ESET Post Training Assessment 2023

ESET Post Training Assessment 2023

Professional Development

15 Qs

Malaysia Cyber Security Strategy (MCSS)

Malaysia Cyber Security Strategy (MCSS)

Professional Development

10 Qs

This game

This game

KG - Professional Development

10 Qs

Cyber security trainig

Cyber security trainig

Professional Development

14 Qs

SECaaS Day 2 - RSA Netwitness

SECaaS Day 2 - RSA Netwitness

Professional Development

10 Qs

SKO 2025 QUIZ

SKO 2025 QUIZ

Professional Development

15 Qs

Cybersecurity April 2023

Cybersecurity April 2023

Assessment

Quiz

Other

Professional Development

Hard

Created by

charan patcha

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?

ip tracker

emails

websites

webpages

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following acts violate cybersecurity?

Exploit

Attack

Threat

Vulnerability

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the weakest link in cybersecurity?

Weak encryption

Humans

Short passwords

Systems

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which method of hacking will record all your keystrokes?

Keyhijacking

Keyjacking

Keylogging

Keyboard Monitoring

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The fullform of EDR is ______

Endpoint Detection and Recovery

Early Detection and Response

Endpoint Detection and Response

Endless Detection and Recovery

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?

Pharming

Website-Duplication

Mimicking

Spamming

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Word "Cyberspace" was coined by _______

Richard Stallman

William Gibson

Andrew Tannenbaum

Scott Fahlman

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?