Search Header Logo

Cyber_Quiz

Authored by Pradeep Verma

Professional Development

5th Grade - University

Used 1+ times

Cyber_Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is not the key pillar of Information Security?

Non-repudiation

Integrity

Obfuscation

Authenticity

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which cyber attack technique users are contacted through fraudulent emails, text messages or phone calls?

Brute Force Attack

Phishing Attack

Man in the Middle Attack

SQL Injection Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which can be motivation/s behind any cyber attack?

Financial gain

Hacktivism

Cyber Warfare

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which stage comes first during any typical cyber attack?

Intrusion

Reconnaissance

Lateral Movement

Denial of Service

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is host level security solution?

WAF in Network

Network Firewall

Anti-Virus/ Anti-Malware Solution

DDoS Detection and Mitigation Solution

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is full form of DDoS?

Distributed Denial of Solutions

Distributed Denial of Service

Distributed Denial of Structure

Distributed Denial of supply

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which DDoS Attack is volumetric attack?

ICMP Flood Attack

UDP Flood Attack

Spoofed Packet Flood Attack

All of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?