Chapter 2.  08/31/2023

Chapter 2. 08/31/2023

University

7 Qs

quiz-placeholder

Similar activities

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

Internet of Things

Internet of Things

University

10 Qs

FortNight Quiz

FortNight Quiz

University

10 Qs

Type of Attacks

Type of Attacks

University

9 Qs

cyber security workshop

cyber security workshop

University

10 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

CompTIA A

CompTIA A

University

10 Qs

QUIZ 3: SECURITY TOOLS and  VULNERABILITY ANALYSIS

QUIZ 3: SECURITY TOOLS and VULNERABILITY ANALYSIS

University

11 Qs

Chapter 2.  08/31/2023

Chapter 2. 08/31/2023

Assessment

Quiz

University

Hard

Created by

Alejandro Falcon

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

As the complexity of a network increases, the possibility of security breaches decreases.
True
False

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Discovery of a vulnerability in a software program can potentially be sold to the government.
True
False

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Even legitimate organizations sometimes use worms, unsolicited email messages sent to large numbers of people, to promote their products.

True
False

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

When you receive a text message that there is a problem with your bank account and you are required you to click on a link to submit some information, you are likely facing a vishing attack
True
False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Someone who violates computer or Internet security maliciously or for illegal personal gain is known as a(n) _______.
lone wolf attacker
industrial spy
hacktivist
cyberterrorist

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your business has a web server that has suddenly become unresponsive. When you study the server's logs there are a huge number of requests from what appear to be legitimate computers. The problem is likely because of _____.
a CAPTCHA issue
a distributed denial-of-service attack
too many Spam emails
a logic bomb

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a denial-of-service (DDoS) attack, the perpetrator ____.
instructs the zombie computers to send simple access requests to target computers
sends out a huge number of spam emails to everyone in your contacts list
changes the configuration information of the infected computers
refuses to accept any email from any sender