Quiz on Cyber Security

Quiz on Cyber Security

Professional Development

15 Qs

quiz-placeholder

Similar activities

Cloud Guardians - Network Security

Cloud Guardians - Network Security

1st Grade - Professional Development

15 Qs

Protocols

Protocols

Professional Development

19 Qs

Test 2 - CCNA 2

Test 2 - CCNA 2

Professional Development

15 Qs

M365 Security Pillar 1 (Identity & Access Management)

M365 Security Pillar 1 (Identity & Access Management)

Professional Development

10 Qs

INFOSEC WEEK DAY 2

INFOSEC WEEK DAY 2

Professional Development

10 Qs

Overview of Video Surveillance System

Overview of Video Surveillance System

Professional Development

20 Qs

EPSE BeNeLux 2025

EPSE BeNeLux 2025

Professional Development

10 Qs

SD-WAN Technology

SD-WAN Technology

University - Professional Development

13 Qs

Quiz on Cyber Security

Quiz on Cyber Security

Assessment

Quiz

Other

Professional Development

Hard

Created by

charan patcha

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_______ is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.

Network Security

Database Security

Information Security

Physical Security

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following information security technology is used for avoiding browser-based hacking?

Anti-malware in browsers

Remote browser access

Adware remover in browsers

Incognito mode in a browser

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_______ technology is used for analyzing and monitoring traffic in network and information flow.

Cloud access security brokers (CASBs)

Managed detection and response (MDR)

Network Security Firewall

Network traffic analysis (NTA)

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.

security officer

malicious hacker

security auditor

network analyst

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?

Rootkits

Backdoors

Trojans

Wireshark

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following typically keeps tabs on every online activity the victim engages in, compiles all the data in the background, and sends it to a third party? 

  1. Adware

  1. Malware

Spyware

All of the above 

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What kind of malware does not replicate or clone itself through infection? 

Rootkits 

Worms 

Viruses

Trojans

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?