Search Header Logo

Cybersecurity Quiz 2

Authored by Shahmir Shamim

Computers

University

10 Questions

Used 2+ times

Cybersecurity Quiz 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

________________ involves deceptive attempts to obtain sensitive information, like passwords or credit card details, by posing as a trustworthy entity.

Phishing

Ransomware

Hacking

Identity theft

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Overloading a system, network, or website to make it __________ to users constitutes a denial of service attack. for those who breach digital security.

Unavailable

Available

Affordable

Accessible

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hackers can use phishing scams, __________, and credit card fraud to steal sensitive financial information.

Ransomware

Internet

Malware

PUPs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the top threats to CNI (Critical National Infrastructure)?

State-sponsored Attacks

IoT Threats

Both (a) & (b)

None of the above

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Cyber and __________ against key infrastructure such as power grids, water systems and gas pipelines could be used to cause mass disruption or loss of life in a single location.

Physical attacks

Online attacks

Bank attacks

None of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Bloomberg notes that there are more than _________ unfilled cybersecurity jobs in the United States

600,000

6,000,000

300,000

4,000,000

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The _________ consists of network-connected devices

Lack of Cybersecurity Talent

Internet of Things (IoT)

Both (a) & (b)

None of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?