ASG -01

ASG -01

10 Qs

quiz-placeholder

Similar activities

L1 Python Recall - Do Now

L1 Python Recall - Do Now

KG - University

8 Qs

MLIT(Round 1)

MLIT(Round 1)

KG - University

15 Qs

ITE 370 - IAS 2 Quiz

ITE 370 - IAS 2 Quiz

KG - University

7 Qs

Topic 14 - Hiring and Managing Employees

Topic 14 - Hiring and Managing Employees

University

15 Qs

Level 5 - Threat Agents Quiz

Level 5 - Threat Agents Quiz

KG - University

7 Qs

CrashCourse Computer Science: Cybersecurity Fundamentals

CrashCourse Computer Science: Cybersecurity Fundamentals

12th Grade

11 Qs

Ecosystem Biodiversity Vocab Quiz

Ecosystem Biodiversity Vocab Quiz

KG - University

10 Qs

Marketing Information Management Quiz

Marketing Information Management Quiz

KG - University

11 Qs

ASG -01

ASG -01

Assessment

Quiz

others

Hard

Created by

Cloud Upskill

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of cybersecurity threat?
Malware
Social engineering
Denial of Service (DoS)
Physical security breach

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a vulnerability in a computer system?
Weak passwords
Firewall protection
Data encryption
Antivirus software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common type of cyber attack?
Physical theft of computers
Phishing
Password guessing
Denial of Service (DoS)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of confidentiality in cybersecurity?
Protecting data from unauthorized access or disclosure
Ensuring data is accurate and reliable
Ensuring data is available when needed
Protecting data from modification or destruction

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of integrity in cybersecurity?
Protecting data from unauthorized access or disclosure
Ensuring data is accurate and reliable
Ensuring data is available when needed
Protecting data from modification or destruction

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of availability in cybersecurity?
Protecting data from unauthorized access or disclosure
Ensuring data is accurate and reliable
Ensuring data is available when needed
Protecting data from modification or destruction

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Distributed Denial of Service (DDoS) attack?
A type of hacking that targets network vulnerabilities
A type of social engineering attack
A type of malware that encrypts files and demands payment for decryption
An attack that floods a network with traffic from multiple sources, making it unavailable

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?