Cybersecurity Quiz

Cybersecurity Quiz

University

40 Qs

quiz-placeholder

Similar activities

CSEC CRJ 235 Chapters 1-4

CSEC CRJ 235 Chapters 1-4

University

40 Qs

Vital Signs #2

Vital Signs #2

11th Grade - University

35 Qs

Occ85 Establish work area protection and safety

Occ85 Establish work area protection and safety

KG - University

37 Qs

Measuring Development

Measuring Development

University

37 Qs

Meeting 2.2: Define your app's problem

Meeting 2.2: Define your app's problem

University

35 Qs

Final Review

Final Review

University

42 Qs

2024-25-1S-ICT106-BLISG3-SFQ11

2024-25-1S-ICT106-BLISG3-SFQ11

University

35 Qs

Hospital Pharmacy Quiz

Hospital Pharmacy Quiz

University

40 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Other

University

Easy

Created by

Jas115 F

Used 4+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A criminal organization has decided to leave their traditional ways and pursue cyberattacks as their new mode of operation. Why would they do this?

Easier to hide their tracks

Generate disruption

Less competition

Political beliefs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor does research, including Google searches, and discovers the cleaning establishment used by the company they want to target. The threat actor gets a job with the cleaning establishment for the sole purpose of obtaining any information that will help in their malicious efforts. What type of attack is the threat actor most likely to engage in?

Dumpster diving

Shoulder surfing

Cyber espionage

Google dorking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Vaani, an IT administrator, discovers her company is using a modular router that will be in an EOL state within six months. Which of the following best describes what the company should do?

Replace the modules in the router with newer ones.

Upgrade the operating system to the latest version.

Update the firmware to patch known threats.

Replace the router with a new model.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A friend gets a virus and asks if you can help them fix the problem. You boot the computer with a bootable flash drive containing security-related tools and remove the virus. What type of control did you employ?

Deterrent

Corrective

Directive

Compensating

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker hacks into a cell phone with the intent of stealing credit card information. The attacker also tries to extend the nefarious activity to contacts in the victim's phone, and their contacts as well. What entity was the attacker targeting?

An enterprise

A competitor

An individual

A government agency

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes what a nation-state actor is most likely to do if their attacks against a target are not successful?

Use different attack tools.

Hire more malicious actors.

Move on to a different target.

Continue trying until successful.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To bypass institutional overhead, a well-intentioned networking instructor purchases a wireless router and connects it to the network. The goal is to allow students to establish connectivity with each other by connecting through the wireless router. In what activity did the instructor participate?

APT

Shadow IT

Insider threat

Ethical hacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?