Search Header Logo

Викторина по кибербезопасности

Authored by Teili Makasheva

Information Technology (IT)

University

Used 1+ times

Викторина по кибербезопасности
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following types of attacks is an example of software?

Incorrect firewall configuration

Social engineering

Virus

Physical access to devices

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is 'social engineering'?

Type of malware

Strategy of manipulating people to obtain confidential information

Technical method of protection

Data encryption method

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods is an example of a 'man-in-the-middle' attack?

Sending spam

Installing malware on a server

Intercepting and modifying communications between two devices

Physical access to a computer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is 'phishing'?

An attack aimed at stealing personal information

A method of protecting against viruses

A type of software

A way of encrypting data

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following methods can be used to protect against application attacks?

Regularly updating software

Ignoring updates

Using outdated hardware

Opening all attachments in emails

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is 'cross-site scripting' (XSS)?

A method of data encryption

A type of malware

A method of virus protection

An attack that exploits vulnerabilities in web applications to inject malicious code

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is 'ransomware'?

A type of firewall

A method of securing data

A type of phishing attack

Malware that encrypts files and demands payment for decryption

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?