
CYBER CHALLENGES'24 QUIZ BATCH 2
Authored by Santhoshkumar M
Information Technology (IT)
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Identify the security protocol which is not strong.
SMTP
SSL
SFTP
HTTPS
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Identify the class of computer threats.
Phishing
DOS attack
Soliciting
Both B and C
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Choose the default port number for Apache and other web servers.
20
27
80
87
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Why is response and transit time used?
To measure reliability
To measure security
To measure longevity
To measure performance
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What are programmes or procedures that enable hackers to maintain control of a computer system ?
Exploits
Antivirus
Firewall by-passers
Worms
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
When the number of users surpasses the network’s capacity, which of the below network factors suffers the most?
Reliability
Performance
Security
Longevity
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
In system hacking, which of the below is the most crucial activity ?
Information gathering
Covering tracks
Cracking passwords
None of the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?