blah

blah

University

7 Qs

quiz-placeholder

Similar activities

CyberCell Quiz Contest

CyberCell Quiz Contest

University

10 Qs

Computer Technology

Computer Technology

University

10 Qs

Moviles 2 . Momento 1

Moviles 2 . Momento 1

11th Grade - University

7 Qs

Basis data

Basis data

University

3 Qs

OBM301: Chapter 5

OBM301: Chapter 5

University

8 Qs

Ofimatica

Ofimatica

University

10 Qs

Web Apps 03 - MongoDB

Web Apps 03 - MongoDB

University

12 Qs

Cyber Security Quiz

Cyber Security Quiz

University

10 Qs

blah

blah

Assessment

Quiz

Instructional Technology

University

Easy

Created by

Shaun Matthews

Used 2+ times

FREE Resource

7 questions

Show all answers

1.

DRAG AND DROP QUESTION

30 sec • 10 pts

What kind of threat is described when a threat actor overloads a network to deny other users network access?​ ​ (a)  

Disruption of service
Data loss
Manipulation
Identity theft
Information theft

2.

CLASSIFICATION QUESTION

3 mins • 20 pts

Place the terms under the correct category heading

Groups:

(a) Worms

,

(b) Viruses

,

(c) Phishing

Attempt to trick victim into providing sensitive information

Exploit network-based vulnerabilities to spread

software that masquerades as harmless

application but includes malware

able to exist and spread without host

Frequently used as umbrella term for many forms of malicious software

Code that attaches itself to host,

replicates and at some stage executes payload

At some stage deliver payload (often malicious code)

Usually uses fake email and / or website

3.

DROPDOWN QUESTION

30 sec • 10 pts

SQL ​ (a)   attacks involve inserting anomalous text into web page input fields to alter ​ (b)   executed in the Database backend. Often used to circumvent authentication or access database records.

injection
SQL queries
Replacement
insertion
SQL commands

4.

DROPDOWN QUESTION

30 sec • 10 pts

Three primary principles and goals used in security are ​ (a)   , ​ ​ (b)   and ​ (c)  

Confidentiality
Integrity
Availability
Sensitive
Honesty
accessibility

5.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which device controls traffic between two or more networks to help prevent unauthorized access?

Firewall

AAA Server

ESA/WSA

IPS

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What type of attack may involve the use of tools such as nslookup and fping?

access attacks

worm attack

denial of service attack

reconnaissance attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which benefit does SSH offer over Telnet for remotely managing a router?

encryption

TCP usage

authorization

connections via multiple VTY lines

Discover more resources for Instructional Technology