
Cybersecurity Essentials
Authored by S. Lestariningati
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
43 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement best describes a motivation of hacktivists?
They are trying to show off their hacking skills.
They are interested in discovering new exploits.
They are curious and learning hacking skills.
They are part of a protest group behind a political cause.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information?
white hat hackers
black hat hackers
gray hat hackers
script kiddies
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An organization allows employees to work from home two days a week. Which technology should be implemented to ensure data confidentiality as data is transmitted?
SHS
Vlans
RAID
VPN
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of networks poses increasing challenges to cybersecurity specialists due to the growth of BYOD on campus?
Wireless networks
wired networks
sneaker net
virtual networks
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cybersecurity specialist is working with the IT staff to establish an effective information security plan. Which combination of security principles forms the foundation of a security plan?
confidentiality, integrity, and availability
technologies, policies, and awareness
secrecy, identify, and nonrepudiation
encryption, authentication, and identification
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users report that the database on the main server cannot be accessed. A database administrator verifies the issue and notices that the database file is now encrypted. The organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?
man in the middle attack
ransomware
Trojan horse
DoS attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which statement describes a distributed denial of service attack?
An attacker sends an enormous quantity of data that a server cannot handle.
An attacker builds a botnet comprised of zombies.
An attacker views network traffic to learn authentication credentials.
One computer accepts data packets based on the MAC address of another computer.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
40 questions
Eng-103 Vocab1
Quiz
•
University
39 questions
U5 Vocab
Quiz
•
University
40 questions
Introduction to Computer
Quiz
•
University
40 questions
ASSESSMENT 2: OVERVIEW OF ICT & REVIEW ON COMPUTER FUNDAMENTALS
Quiz
•
University
40 questions
TIK kelas 7, Penilaian Tengah semester
Quiz
•
7th Grade - University
43 questions
Ôn Tập Kiểm Tra KHTN 7
Quiz
•
1st Grade - University
40 questions
PSTS KELAS 11 SMT GANJIL 2025
Quiz
•
10th Grade - University
44 questions
Data Structures Quiz
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade