Search Header Logo

CyberLab

Authored by THARUN D V

Computers

1st Grade

Used 1+ times

CyberLab
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following protocols is used to secure web traffic?

HTTP

HTTPS

FTP

SMTP

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the purpose of a firewall in network security?

  1. To prevent unauthorised access

  1. To encrypt data transmission

  1. To provide antivirus protection

  1. To monitor network performance

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which command is used to change file permissions in Linux?

chmod

chown

chgr

None

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the default port number for SSH (Secure Shell) protocol?

80

22

21

8080

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack aims to overload a system by flooding it with excessive network traffic?

DOS

(Denial of Service)

MITM

(Man in the Middle Attack)

De-authentication

Attack

Spoofing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In networking, what is the purpose of an IP address?

To identify a specific computer on a network

To encrypt data transmissions

To provide firewall protection

To establish a VPN connection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a secure password practice?

Using a combination of uppercase and lowercase letters

Using common dictionary words

Including numbers and special characters

Using a long passphrase

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?