Cybersecurity Quiz

Cybersecurity Quiz

8th Grade

60 Qs

quiz-placeholder

Similar activities

June

June

8th Grade

60 Qs

Web Design EOPA Practice

Web Design EOPA Practice

5th - 12th Grade

55 Qs

Computer Hardware and Software Test

Computer Hardware and Software Test

6th - 8th Grade

60 Qs

Computing Essential ICT

Computing Essential ICT

6th - 8th Grade

55 Qs

GRADE 8 4TH MONTHLY EXAM- COMPUTER 8

GRADE 8 4TH MONTHLY EXAM- COMPUTER 8

8th Grade - University

56 Qs

Pre-test on Creative Tech 2

Pre-test on Creative Tech 2

8th Grade

65 Qs

Module 5 Test Review

Module 5 Test Review

7th - 12th Grade

56 Qs

END OF TERM ONE (2023)- FORM 3

END OF TERM ONE (2023)- FORM 3

8th Grade - University

57 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Harrison Palzewicz

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The board of directors is responsible for which of the following?

Transference

Avoidance

Mitigation

Acknowledgement

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A forensic analyst needs to identify the hash value of a disk image. Which of the following is the most appropriate tool to use?

Calculate the checksum

Look for the hash value in the image

Ensure proper procedures for chain of custody are followed

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security manager has to map a network drive. Which of the following commands should be used?

map-p 80 to 10.10.0.2

nslookup 10.10.0.2

pathping 10.10.10.0 -p 80

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security manager has to map a network drive. Which of the following commands should be used?

map-p 80 to 10.10.0.2

Most VDI

Avoidance

Acknowledgement

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A help desk technician receives a call from a user who is unable to access a file. Which of the following should the technician do first?

Check the metadata in the file

Hover the mouse over the file

Forward the email to the CIO and ask if the CIO sent it

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the best method to prevent a phishing attack?

A visiting email stating a cash settlement has been approved

A phishing email stating a cash settlement has been approved

A phishing email stating a cash settlement has been approved

A phishing email stating a cash settlement has been approved

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security forensic analyst needs to identify the hash value of a disk image. Which of the following is the most appropriate tool to use?

Snapshot

Incremental

Full

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?