Search Header Logo

Cybersecurity April 2023

Authored by charan patcha

Other

Professional Development

Used 2+ times

Cybersecurity April 2023
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following do Cyber attackers commonly target for fetching IP address of a target or victim user?

ip tracker

emails

websites

webpages

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Which of the following acts violate cybersecurity?

Exploit

Attack

Threat

Vulnerability

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the weakest link in cybersecurity?

Weak encryption

Humans

Short passwords

Systems

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which method of hacking will record all your keystrokes?

Keyhijacking

Keyjacking

Keylogging

Keyboard Monitoring

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The fullform of EDR is ______

Endpoint Detection and Recovery

Early Detection and Response

Endpoint Detection and Response

Endless Detection and Recovery

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is the hacking approach where cyber-criminals design fake websites or pages for tricking or gaining additional traffic?

Pharming

Website-Duplication

Mimicking

Spamming

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Word "Cyberspace" was coined by _______

Richard Stallman

William Gibson

Andrew Tannenbaum

Scott Fahlman

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?