
Cybersecurity Quiz
Authored by Amilcar Asencio III
Computers
12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
100 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does the term "Absolute file path" refer to in cybersecurity?
A) A type of attack where data packets are manipulated in transit
B) The full file path, which starts from the root
C) A network protocol used to determine the MAC address of the next router or device on the path
D) A detection method that identifies abnormal behavior
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is "Access controls" in the context of cybersecurity?
A) A set of rules used to solve a problem
B) A type of legitimate software that displays digital advertisements
C) Security controls that manage access, authorization, and accountability of information
D) The investigation and validation of alerts
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is "Active packet sniffing"?
A) A detection method that identifies abnormal behavior
B) A technique that manipulates AI and ML technology to conduct attacks
C) A type of legitimate software used to display digital advertisements
D) A type of attack where data packets are manipulated in transit
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does "Address Resolution Protocol (ARP)" stand for?
A) A technique where attackers impersonate customer service representatives on social media
B) A set of rules used to solve a problem
C) A network protocol used to determine the MAC address of the next router or device on the path
D) A detection method that identifies abnormal behavior
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is an "Advanced persistent threat (APT)"?
A) A detection method that identifies abnormal behavior
B) An instance when a threat actor maintains unauthorized access to a system for an extended period of time
C) A type of legitimate software that is sometimes used to display digital advertisements
D) A technique where attackers impersonate customer service representatives on social media
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is "Adversarial artificial intelligence (AI)"?
A) A detection method that identifies abnormal behavior
B) A technique that manipulates AI and ML technology to conduct attacks more efficiently
C) A network protocol used to determine the MAC address of the next router or device on the path
D) A type of attack where data packets are manipulated in transit
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is "Adware"?
A) A type of attack where data packets are manipulated in transit
B) A network protocol used to determine the MAC address of the next router or device on the path
C) A type of legitimate software that is sometimes used to display digital advertisements
D) A technique that manipulates AI and ML technology to conduct attacks more efficiently
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?