CYBER CHALLENGES'24 QUIZ BATCH 2

CYBER CHALLENGES'24 QUIZ BATCH 2

University

20 Qs

quiz-placeholder

Similar activities

Quiz 1 | Information Security | Kali Linux Commands

Quiz 1 | Information Security | Kali Linux Commands

University

20 Qs

Quiz KTI

Quiz KTI

University

20 Qs

HCI GOMS quiz

HCI GOMS quiz

University

15 Qs

ViewSonic LCD Training

ViewSonic LCD Training

12th Grade - University

15 Qs

Titanic Challenge

Titanic Challenge

University

16 Qs

MS Access

MS Access

University

15 Qs

CHAPTER 3: SYSTEM ANALYSIS AND DESIGN

CHAPTER 3: SYSTEM ANALYSIS AND DESIGN

University

19 Qs

Computer Network and Wireless Network

Computer Network and Wireless Network

7th Grade - University

18 Qs

CYBER CHALLENGES'24 QUIZ BATCH 2

CYBER CHALLENGES'24 QUIZ BATCH 2

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Hard

Created by

Santhoshkumar M

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Identify the security protocol which is not strong.

SMTP

SSL

SFTP

HTTPS

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Identify the class of computer threats.

Phishing

DOS attack

Soliciting

Both B and C

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Choose the default port number for Apache and other web servers.

20

27

80

87

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Why is response and transit time used?

To measure reliability

To measure security

To measure longevity

To measure performance

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

What are programmes or procedures that enable hackers to maintain control of a computer system ?

Exploits

Antivirus

Firewall by-passers

Worms

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

When the number of users surpasses the network’s capacity, which of the below network factors suffers the most?

Reliability

Performance

Security

Longevity

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

In system hacking, which of the below is the most crucial activity ?

Information gathering

Covering tracks

Cracking passwords

None of the above

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?