
Cybersecurity Quiz

Quiz
•
Other
•
University
•
Easy
Jas115 F
Used 4+ times
FREE Resource
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A criminal organization has decided to leave their traditional ways and pursue cyberattacks as their new mode of operation. Why would they do this?
Easier to hide their tracks
Generate disruption
Less competition
Political beliefs
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A threat actor does research, including Google searches, and discovers the cleaning establishment used by the company they want to target. The threat actor gets a job with the cleaning establishment for the sole purpose of obtaining any information that will help in their malicious efforts. What type of attack is the threat actor most likely to engage in?
Dumpster diving
Shoulder surfing
Cyber espionage
Google dorking
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Vaani, an IT administrator, discovers her company is using a modular router that will be in an EOL state within six months. Which of the following best describes what the company should do?
Replace the modules in the router with newer ones.
Upgrade the operating system to the latest version.
Update the firmware to patch known threats.
Replace the router with a new model.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A friend gets a virus and asks if you can help them fix the problem. You boot the computer with a bootable flash drive containing security-related tools and remove the virus. What type of control did you employ?
Deterrent
Corrective
Directive
Compensating
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker hacks into a cell phone with the intent of stealing credit card information. The attacker also tries to extend the nefarious activity to contacts in the victim's phone, and their contacts as well. What entity was the attacker targeting?
An enterprise
A competitor
An individual
A government agency
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes what a nation-state actor is most likely to do if their attacks against a target are not successful?
Use different attack tools.
Hire more malicious actors.
Move on to a different target.
Continue trying until successful.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
To bypass institutional overhead, a well-intentioned networking instructor purchases a wireless router and connects it to the network. The goal is to allow students to establish connectivity with each other by connecting through the wireless router. In what activity did the instructor participate?
APT
Shadow IT
Insider threat
Ethical hacking
Create a free account and access millions of resources
Similar Resources on Wayground
40 questions
Geology Review

Quiz
•
KG - University
38 questions
Motivation Theories

Quiz
•
University
43 questions
National 5 Bus Mgt HR Recruitment and Selection

Quiz
•
KG - University
44 questions
Skeletal System

Quiz
•
12th Grade - University
40 questions
2107 Unit Test 1

Quiz
•
University
35 questions
Examination of Introduction to Information Technology

Quiz
•
University
35 questions
Transmissions (4290-162)

Quiz
•
12th Grade - University
35 questions
2024-25-2S-PROFEL4-PQ2

Quiz
•
University
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade