Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

University

20 Qs

quiz-placeholder

Similar activities

L7 MSC Network Security Quiz

L7 MSC Network Security Quiz

University

17 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

Network Defence

Network Defence

University

20 Qs

J277 - 1.4 - Network Threats

J277 - 1.4 - Network Threats

10th Grade - University

16 Qs

3A-DDC313-SW5

3A-DDC313-SW5

University

20 Qs

Security+ Wireless Security Quiz

Security+ Wireless Security Quiz

University

20 Qs

1.3 - Surveying the Cyberspace

1.3 - Surveying the Cyberspace

University

15 Qs

CIS1103 Week 11-12 CLO 5 Security

CIS1103 Week 11-12 CLO 5 Security

University

16 Qs

Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Nayan R

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a method to secure a password?

Storing it in a text file

Sharing it with friends

Using two-factor authentication

Writing it on a sticky note

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of cyber attack does the attacker compromise a network by exploiting the relationship between two devices in communication to intercept and alter the data?

Denial of Service (DoS)

Man-in-the-Middle (MitM)

Cross-Site Scripting (XSS)

Brute Force

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the acronym VPN stand for?

Virtual Private Network

Virtual Public Network

Very Private Network

Virtual Protected Network

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common form of malware?

Phishing

Firewall

Antivirus

Virus

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a firewall in a computer network?

To physically block unwanted cables

To prevent unauthorized access to or from a network

To store data securely

To increase internet speed

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cyber attack involves tricking users into divulging sensitive information?

Phishing

Ransomware

DoS attack

SQL injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which protocol is primarily used for securely transmitting data over the Internet?

HTTP

HTTPS

FTP

SMTP

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?