Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

University

20 Qs

quiz-placeholder

Similar activities

Threats, Issues, and Defenses - Ch 5

Threats, Issues, and Defenses - Ch 5

10th Grade - University

20 Qs

Target

Target

University

16 Qs

Knowing Yourself & Enemy

Knowing Yourself & Enemy

University

19 Qs

Module 1.1: Common Threats

Module 1.1: Common Threats

11th Grade - University

25 Qs

Cyber Security

Cyber Security

University

23 Qs

Security+ Wireless Security Quiz

Security+ Wireless Security Quiz

University

20 Qs

Network Security 2

Network Security 2

University

21 Qs

L7 MSC Network Security Quiz

L7 MSC Network Security Quiz

University

17 Qs

Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Nayan R

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method to secure a password?

Storing it in a text file

Sharing it with friends

Using two-factor authentication

Writing it on a sticky note

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of cyber attack does the attacker compromise a network by exploiting the relationship between two devices in communication to intercept and alter the data?

Denial of Service (DoS)

Man-in-the-Middle (MitM)

Cross-Site Scripting (XSS)

Brute Force

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym VPN stand for?

Virtual Private Network

Virtual Public Network

Very Private Network

Virtual Protected Network

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common form of malware?

Phishing

Firewall

Antivirus

Virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall in a computer network?

To physically block unwanted cables

To prevent unauthorized access to or from a network

To store data securely

To increase internet speed

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cyber attack involves tricking users into divulging sensitive information?

Phishing

Ransomware

DoS attack

SQL injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is primarily used for securely transmitting data over the Internet?

HTTP

HTTPS

FTP

SMTP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?