Cybersecurity Essentials

Cybersecurity Essentials

University

43 Qs

quiz-placeholder

Similar activities

Midterm Examination-Infoman 2

Midterm Examination-Infoman 2

University

45 Qs

GCSE Computer Science - 2.1-2.2

GCSE Computer Science - 2.1-2.2

University

43 Qs

Midterm Exam - Info Mgt - Part 1

Midterm Exam - Info Mgt - Part 1

University

40 Qs

BASIS DATA 1

BASIS DATA 1

University

40 Qs

Sistem Basis Data UTS Latihan

Sistem Basis Data UTS Latihan

University

42 Qs

IT213 Final Exam

IT213 Final Exam

University

40 Qs

IAS - Assignment 3

IAS - Assignment 3

University

40 Qs

database

database

University

40 Qs

Cybersecurity Essentials

Cybersecurity Essentials

Assessment

Quiz

Computers

University

Easy

Created by

S. Lestariningati

Used 1+ times

FREE Resource

43 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement best describes a motivation of hacktivists?

They are trying to show off their hacking skills.

  • They are interested in discovering new exploits.

  • They are curious and learning hacking skills.

They are part of a protest group behind a political cause.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information?

white hat hackers

black hat hackers

gray hat hackers

script kiddies

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization allows employees to work from home two days a week. Which technology should be implemented to ensure data confidentiality as data is transmitted?

SHS

Vlans

RAID

VPN

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of networks poses increasing challenges to cybersecurity specialists due to the growth of BYOD on campus?

Wireless networks

wired networks

sneaker net

virtual networks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybersecurity specialist is working with the IT staff to establish an effective information security plan. Which combination of security principles forms the foundation of a security plan?

confidentiality, integrity, and availability

  • technologies, policies, and awareness

  • secrecy, identify, and nonrepudiation

  • encryption, authentication, and identification

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Users report that the database on the main server cannot be accessed. A database administrator verifies the issue and notices that the database file is now encrypted. The organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?

man in the middle attack

ransomware

Trojan horse

DoS attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes a distributed denial of service attack?

  • An attacker sends an enormous quantity of data that a server cannot handle.

An attacker builds a botnet comprised of zombies.

  • An attacker views network traffic to learn authentication credentials.

  • One computer accepts data packets based on the MAC address of another computer.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?