Cybersecurity Quiz

Cybersecurity Quiz

8th Grade

60 Qs

quiz-placeholder

Similar activities

Unit 2: Cryptography

Unit 2: Cryptography

8th Grade - University

64 Qs

Keyboarding Exam Review

Keyboarding Exam Review

8th - 10th Grade

58 Qs

ИКТ 2021

ИКТ 2021

1st Grade - University

55 Qs

Computer Safety and Security - 2

Computer Safety and Security - 2

7th - 8th Grade

65 Qs

Python Year 7 Assessment

Python Year 7 Assessment

7th - 9th Grade

55 Qs

Venture: Entrepreneurial Expedition

Venture: Entrepreneurial Expedition

8th Grade

59 Qs

Green Architecture SLO

Green Architecture SLO

8th Grade

55 Qs

Year 8 - Term 2.2 Quiz

Year 8 - Term 2.2 Quiz

8th Grade - University

59 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Harrison Palzewicz

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The board of directors is responsible for which of the following?

Transference

Avoidance

Mitigation

Acknowledgement

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A forensic analyst needs to identify the hash value of a disk image. Which of the following is the most appropriate tool to use?

Calculate the checksum

Look for the hash value in the image

Ensure proper procedures for chain of custody are followed

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security manager has to map a network drive. Which of the following commands should be used?

map-p 80 to 10.10.0.2

nslookup 10.10.0.2

pathping 10.10.10.0 -p 80

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security manager has to map a network drive. Which of the following commands should be used?

map-p 80 to 10.10.0.2

Most VDI

Avoidance

Acknowledgement

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A help desk technician receives a call from a user who is unable to access a file. Which of the following should the technician do first?

Check the metadata in the file

Hover the mouse over the file

Forward the email to the CIO and ask if the CIO sent it

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the best method to prevent a phishing attack?

A visiting email stating a cash settlement has been approved

A phishing email stating a cash settlement has been approved

A phishing email stating a cash settlement has been approved

A phishing email stating a cash settlement has been approved

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security forensic analyst needs to identify the hash value of a disk image. Which of the following is the most appropriate tool to use?

Snapshot

Incremental

Full

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?