Cyber Security-See Yourself in Cyber

Cyber Security-See Yourself in Cyber

Professional Development

20 Qs

quiz-placeholder

Similar activities

Excel Formula

Excel Formula

4th Grade - Professional Development

20 Qs

DBMS-QUIZ

DBMS-QUIZ

Professional Development

20 Qs

PC Troubleshooting

PC Troubleshooting

Professional Development

20 Qs

MS OFFICE QUIZ 01

MS OFFICE QUIZ 01

Professional Development

20 Qs

command prompt

command prompt

4th Grade - Professional Development

15 Qs

NM-BIG DATA Course

NM-BIG DATA Course

Professional Development

20 Qs

Quiz TLJ Kelas XII TKJ  (Tugas Diklat 7 Samisanov)

Quiz TLJ Kelas XII TKJ (Tugas Diklat 7 Samisanov)

Professional Development

15 Qs

Computer Networks-Model Exam-II-PART-B

Computer Networks-Model Exam-II-PART-B

Professional Development

15 Qs

Cyber Security-See Yourself in Cyber

Cyber Security-See Yourself in Cyber

Assessment

Quiz

Computers

Professional Development

Practice Problem

Hard

Created by

charan patcha

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

________________ is a platform that essentially keeps the log of data from networks, devices as well as applications in a single location.

EventLog Analyser

NordVPN

Wireshark

PacketFilter Analyzer

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

___________ ensures the integrity and security of data that are passing over a network.

Firewall

AntiVirus

Pentesting Tools

Network-Security Protocols

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

_________________ is the kind of firewall is connected between the device and the network connecting to internet

Hardware Firewall

Software Firewall

Stateful Inspection Firewall

Microsoft Firewall

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Download copy, extract data from an open system done fraudulently is treated as _________

cyber-warfare

cyber-security act

data-backup

cyber-crime

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

________________ has become a popular attack since last few years, and the attacker target board members, high-ranked officials and managing committee members of an organization.

Spyware

Ransomware

Adware

Shareware

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Failed sessions allow brute-force attacks on access credentials. This type of attacks are done in which layer of the OSI model?

Physical layer

Data-link Layer

Session layer

Presentation layer

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

As a backup for securing your device, it is necessary to create a _____________

backup point

copy of files in separate drives

copy of files in the same drives

restore point

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?