Cyber Security-See Yourself in Cyber

Cyber Security-See Yourself in Cyber

Professional Development

20 Qs

quiz-placeholder

Similar activities

 Network Security Fundamentals

Network Security Fundamentals

Professional Development

20 Qs

Network Plus Pre Assessment

Network Plus Pre Assessment

Professional Development

15 Qs

CIW IBA Lesson 8 Vocabulary

CIW IBA Lesson 8 Vocabulary

8th Grade - Professional Development

21 Qs

IT mock test

IT mock test

Professional Development

20 Qs

Cybersecurity Quiz for DCB Parents

Cybersecurity Quiz for DCB Parents

Professional Development

20 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

20 Qs

Cyber Security

Cyber Security

Professional Development

20 Qs

Chapter 7

Chapter 7

Professional Development

20 Qs

Cyber Security-See Yourself in Cyber

Cyber Security-See Yourself in Cyber

Assessment

Quiz

Computers

Professional Development

Hard

Created by

charan patcha

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location.

EventLog Analyser

NordVPN

Wireshark

PacketFilter Analyzer

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

___________ ensures the integrity and security of data that are passing over a network.

Firewall

AntiVirus

Pentesting Tools

Network-Security Protocols

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_________________ is the kind of firewall is connected between the device and the network connecting to internet

Hardware Firewall

Software Firewall

Stateful Inspection Firewall

Microsoft Firewall

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Download copy, extract data from an open system done fraudulently is treated as _________

cyber-warfare

cyber-security act

data-backup

cyber-crime

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization.

Spyware

Ransomware

Adware

Shareware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?

Physical layer

Data-link Layer

Session layer

Presentation layer

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

As a backup for securing your device, it is necessary to create a _____________

backup point

copy of files in separate drives

copy of files in the same drives

restore point

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?