Cyber Security Quiz 2

Cyber Security Quiz 2

University

103 Qs

quiz-placeholder

Similar activities

Excel/Access EOC Review

Excel/Access EOC Review

9th Grade - University

100 Qs

Smart City | Quiz

Smart City | Quiz

University

100 Qs

ข้อสอบปลายภาค MBI0403 การจัดการธุรกิจดิจิทัล

ข้อสอบปลายภาค MBI0403 การจัดการธุรกิจดิจิทัล

University

100 Qs

ENSA MIDTERM 7,8,9

ENSA MIDTERM 7,8,9

12th Grade - Professional Development

100 Qs

Test sobre Ciberseguridad

Test sobre Ciberseguridad

University

100 Qs

SOAL ULANGAN HARIAN 1 KODING DAN KECERDASAN ARTIFISIAL

SOAL ULANGAN HARIAN 1 KODING DAN KECERDASAN ARTIFISIAL

10th Grade - University

100 Qs

Java

Java

University

100 Qs

Test CCNA 200-301

Test CCNA 200-301

University

100 Qs

Cyber Security Quiz 2

Cyber Security Quiz 2

Assessment

Quiz

Computers

University

Medium

Created by

Nilotpal Pathak

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

103 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Anti-virus

Firewall

Encryption

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An individual who uses scripts or software written by someone else to exploit or break into a computer system.

Cracker

Ethical Hacker

Script Kiddie

Man in the middle

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following passwords meet password requirements?

p455w0rd1

!@#$%^&*

akHGksmLN

uP1b@!Si7p

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber crime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

Cyber criminal

Phishing

Attack password

Online predator

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The technology and process that is designed to protect networks and devices from attack, damage, or unauthorized access

Cyber Security

White Hat Hacker

Domain Name Server

All of the above

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the motives behind cyber crime?

Demanding ransom

Propagating religious or political beliefs

Financial loss to the target

Information thefts and manipulating data

All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Individuals with wide range of skills motivated by religious or political beliefs to create fear by large- scale disruption of computer networks

State sponsored hacker

Hactivist

Cyber terrorist

Black hat hacker

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?