Search Header Logo

CYBER CHALLENGES'24 QUIZ BATCH 2

Authored by Santhoshkumar M

Information Technology (IT)

University

Used 2+ times

CYBER CHALLENGES'24 QUIZ BATCH 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Identify the security protocol which is not strong.

SMTP

SSL

SFTP

HTTPS

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Identify the class of computer threats.

Phishing

DOS attack

Soliciting

Both B and C

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Choose the default port number for Apache and other web servers.

20

27

80

87

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Why is response and transit time used?

To measure reliability

To measure security

To measure longevity

To measure performance

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are programmes or procedures that enable hackers to maintain control of a computer system ?

Exploits

Antivirus

Firewall by-passers

Worms

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

When the number of users surpasses the network’s capacity, which of the below network factors suffers the most?

Reliability

Performance

Security

Longevity

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In system hacking, which of the below is the most crucial activity ?

Information gathering

Covering tracks

Cracking passwords

None of the above

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?