Chapter 1 quizzes

Chapter 1 quizzes

University

13 Qs

quiz-placeholder

Similar activities

Riddles

Riddles

University

10 Qs

EPTIK - Pertemuan 4

EPTIK - Pertemuan 4

University

10 Qs

Chapter 13 - Computer Security

Chapter 13 - Computer Security

University

10 Qs

Information Security Threats & Policies in Europe

Information Security Threats & Policies in Europe

University

10 Qs

 Theft and Script Kiddies

Theft and Script Kiddies

University

10 Qs

Understanding Cybersecurity

Understanding Cybersecurity

5th Grade - Professional Development

10 Qs

305 - DAY 5

305 - DAY 5

University

13 Qs

Modes of attack

Modes of attack

University

18 Qs

Chapter 1 quizzes

Chapter 1 quizzes

Assessment

Quiz

Computers

University

Medium

Created by

Kevin Wong

Used 1+ times

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can an individual build and practice the skills necessary to become a cybersecurity specialist?

Dreaming

Download and run code

Go hiking

Participating in skills competitions

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Many of the world’s original hackers were computer hobbyists, programmers and students during the 60’s?​

Maybe

False

I don't know

True

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Name ONE main concern of cybersecurity professionals.

vulnerabilities

availabilities

downtime

Threats

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of an Internet data domain?

Palo Alto

Linkedin

Juniper

Cisco

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym IoE represent?

Internet of Everyday

Internet of Everything

Insight into Everything

Intelligence on Everything

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

APT

Algorithm

DDos

Exhaustion

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term vulnerability mean?

a known target or victim machine

a method of attack to exploit a target

a potential threat that a hacker creates

a weakness that makes a target susceptible to an attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?