ASG -01

ASG -01

10 Qs

quiz-placeholder

Similar activities

Cyber Security Vocabulary (Set 3)

Cyber Security Vocabulary (Set 3)

KG - University

10 Qs

Sec+ - Crypto Quiz 2 of 2

Sec+ - Crypto Quiz 2 of 2

KG - University

10 Qs

WWII Test Mod C

WWII Test Mod C

9th - 12th Grade

10 Qs

French Revolution Test Review

French Revolution Test Review

5th Grade

15 Qs

Vocab Set #4: Unit 1 Scientific Concepts 4

Vocab Set #4: Unit 1 Scientific Concepts 4

KG - University

15 Qs

ASG -01

ASG -01

KG - University

10 Qs

Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

KG - University

15 Qs

ASG -01

ASG -01

Assessment

Quiz

others

Hard

Created by

Cloud Upskill

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of cybersecurity threat?
Malware
Social engineering
Denial of Service (DoS)
Physical security breach

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a vulnerability in a computer system?
Weak passwords
Firewall protection
Data encryption
Antivirus software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common type of cyber attack?
Physical theft of computers
Phishing
Password guessing
Denial of Service (DoS)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of confidentiality in cybersecurity?
Protecting data from unauthorized access or disclosure
Ensuring data is accurate and reliable
Ensuring data is available when needed
Protecting data from modification or destruction

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of integrity in cybersecurity?
Protecting data from unauthorized access or disclosure
Ensuring data is accurate and reliable
Ensuring data is available when needed
Protecting data from modification or destruction

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the principle of availability in cybersecurity?
Protecting data from unauthorized access or disclosure
Ensuring data is accurate and reliable
Ensuring data is available when needed
Protecting data from modification or destruction

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Distributed Denial of Service (DDoS) attack?
A type of hacking that targets network vulnerabilities
A type of social engineering attack
A type of malware that encrypts files and demands payment for decryption
An attack that floods a network with traffic from multiple sources, making it unavailable

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?