Cyber Law & Ethics Quiz(Section 2.2)

Cyber Law & Ethics Quiz(Section 2.2)

University

15 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz

Cybersecurity Quiz

University

20 Qs

Chapter 4

Chapter 4

University

10 Qs

Module 6: Defensive Security

Module 6: Defensive Security

University

10 Qs

Google Analytics Quiz

Google Analytics Quiz

University

15 Qs

Lesson 13 Quiz

Lesson 13 Quiz

University

18 Qs

Networking Today Quiz

Networking Today Quiz

University

20 Qs

Quiz PLD 1

Quiz PLD 1

University

10 Qs

SOAL INFORMATIKA KELAS Xl.1dan XI.2

SOAL INFORMATIKA KELAS Xl.1dan XI.2

12th Grade - University

20 Qs

Cyber Law & Ethics Quiz(Section 2.2)

Cyber Law & Ethics Quiz(Section 2.2)

Assessment

Quiz

Other

University

Medium

Created by

Dr. Singh

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does malware refer to?

Malicious software designed to harm systems

A type of firewall

A secure coding practice

A method of data encryption

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware encrypts files and demands a ransom?

Virus

Worm

Ransomware

Trojan

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Denial of Service (DoS) attack primarily aimed at?

Gaining unauthorized access

Installing malware

Disrupting service availability

Stealing data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack method floods a target with excessive traffic?

Session Hijacking

Volume-based Attack

Protocol Attack

Application Layer Attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of a Distributed Denial of Service (DDoS) attack?

To gain unauthorized access

To disrupt services using multiple devices

To steal sensitive information

To install spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method to mitigate DoS attacks?

Using strong passwords

User education

Regularly updating software

Implementing DDoS protection services

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SQL Injection exploit?

User passwords

Malicious email attachments

Weaknesses in web applications

Network vulnerabilities

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?