Cybersecurity Quiz

Cybersecurity Quiz

University

40 Qs

quiz-placeholder

Similar activities

Maslow's Hierarchy of Needs

Maslow's Hierarchy of Needs

11th Grade - University

40 Qs

Transmissions (4290-162)

Transmissions (4290-162)

12th Grade - University

35 Qs

Types of Housing Quiz

Types of Housing Quiz

12th Grade - University

39 Qs

RIASEC Work Quiz

RIASEC Work Quiz

9th Grade - University

39 Qs

Personal Finance Final Review

Personal Finance Final Review

11th Grade - University

41 Qs

Logistics Environment I & II - Security

Logistics Environment I & II - Security

9th Grade - Professional Development

35 Qs

Theories of Crime Causation

Theories of Crime Causation

University

45 Qs

National 5 Bus Mgt HR Recruitment and Selection

National 5 Bus Mgt HR Recruitment and Selection

KG - University

43 Qs

Cybersecurity Quiz

Cybersecurity Quiz

Assessment

Quiz

Other

University

Easy

Created by

Jas115 F

Used 4+ times

FREE Resource

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A criminal organization has decided to leave their traditional ways and pursue cyberattacks as their new mode of operation. Why would they do this?

Easier to hide their tracks

Generate disruption

Less competition

Political beliefs

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor does research, including Google searches, and discovers the cleaning establishment used by the company they want to target. The threat actor gets a job with the cleaning establishment for the sole purpose of obtaining any information that will help in their malicious efforts. What type of attack is the threat actor most likely to engage in?

Dumpster diving

Shoulder surfing

Cyber espionage

Google dorking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Vaani, an IT administrator, discovers her company is using a modular router that will be in an EOL state within six months. Which of the following best describes what the company should do?

Replace the modules in the router with newer ones.

Upgrade the operating system to the latest version.

Update the firmware to patch known threats.

Replace the router with a new model.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A friend gets a virus and asks if you can help them fix the problem. You boot the computer with a bootable flash drive containing security-related tools and remove the virus. What type of control did you employ?

Deterrent

Corrective

Directive

Compensating

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker hacks into a cell phone with the intent of stealing credit card information. The attacker also tries to extend the nefarious activity to contacts in the victim's phone, and their contacts as well. What entity was the attacker targeting?

An enterprise

A competitor

An individual

A government agency

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes what a nation-state actor is most likely to do if their attacks against a target are not successful?

Use different attack tools.

Hire more malicious actors.

Move on to a different target.

Continue trying until successful.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To bypass institutional overhead, a well-intentioned networking instructor purchases a wireless router and connects it to the network. The goal is to allow students to establish connectivity with each other by connecting through the wireless router. In what activity did the instructor participate?

APT

Shadow IT

Insider threat

Ethical hacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?