Chapter 1 quizzes

Chapter 1 quizzes

University

13 Qs

quiz-placeholder

Similar activities

Chapter 1: Introduction to Cyber Security

Chapter 1: Introduction to Cyber Security

University

15 Qs

Cybersecurity and Technological Changes Quiz

Cybersecurity and Technological Changes Quiz

University

10 Qs

Cybersecurty Concepts

Cybersecurty Concepts

University

10 Qs

Securing internet of things

Securing internet of things

University

10 Qs

Prueba de Diagnóstico - HACKING ÉTICO

Prueba de Diagnóstico - HACKING ÉTICO

University

15 Qs

Branch Day Movie Quiz

Branch Day Movie Quiz

University

13 Qs

Internet Security

Internet Security

University

15 Qs

Pentesting

Pentesting

University

10 Qs

Chapter 1 quizzes

Chapter 1 quizzes

Assessment

Quiz

Computers

University

Medium

Created by

Kevin Wong

Used 1+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can an individual build and practice the skills necessary to become a cybersecurity specialist?

Dreaming

Download and run code

Go hiking

Participating in skills competitions

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Many of the world’s original hackers were computer hobbyists, programmers and students during the 60’s?​

Maybe

False

I don't know

True

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Name ONE main concern of cybersecurity professionals.

vulnerabilities

availabilities

downtime

Threats

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an Internet data domain?

Palo Alto

Linkedin

Juniper

Cisco

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym IoE represent?

Internet of Everyday

Internet of Everything

Insight into Everything

Intelligence on Everything

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

APT

Algorithm

DDos

Exhaustion

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a known target or victim machine

a method of attack to exploit a target

a potential threat that a hacker creates

a weakness that makes a target susceptible to an attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?