CyberSecurity

CyberSecurity

Professional Development

13 Qs

quiz-placeholder

Similar activities

Fundamental Of ICT

Fundamental Of ICT

Professional Development

10 Qs

Its Network Security

Its Network Security

Professional Development

15 Qs

cyber security

cyber security

KG - Professional Development

14 Qs

Telco Practice Test 1

Telco Practice Test 1

Professional Development

15 Qs

Sec+ CH.2 Review Test

Sec+ CH.2 Review Test

Professional Development

15 Qs

GUESS THAT WORD IN CYBER!

GUESS THAT WORD IN CYBER!

Professional Development

10 Qs

Class Test-5

Class Test-5

Professional Development

15 Qs

Cyber Resilience Training

Cyber Resilience Training

Professional Development

16 Qs

CyberSecurity

CyberSecurity

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Patrick Mahasha

Used 8+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of hacker is one who intends to do harm?

Grey Hat

White Hat

Black Hat

Hacker

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of a firewall in a cybersecurity context?

To prevent physical access to a computer.

To block all incoming and outgoing network traffic.

To monitor and control network traffic based on a set of security rules.

To encrypt all data on a computer.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Phishing is a cyberattack method that involves tricking individuals into revealing sensitive information through deceptive emails or websites.

True

False

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What type of Malware is this:

Transnet has been hacked through a Denial of Service attack , the hackers want money in crypto to allow Transet to resume operations.

Adware

Spyware

Ransomware

Malware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of two-factor authentication (2FA)?

Using a username and password to log in.

Using a fingerprint scan and a retinal scan to log in.

Using a smart card and a PIN to log in.

Using a CAPTCHA to log in.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the main goal of a DDoS (Distributed Denial of Service) attack?


To steal sensitive data from a computer .

To overload a network or website with traffic, making it unavailable to users.

To gain unauthorized access to a computer system.

To spread malware to multiple devices.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption protocol is commonly used to secure web traffic by ensuring data confidentiality and integrity?

HTTPS

FTP

SMTP

SNMP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?