Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

University

9 Qs

quiz-placeholder

Similar activities

TOOLS FOR AD & TECHNOLOGY DEVELOPMENT (W4-W6)

TOOLS FOR AD & TECHNOLOGY DEVELOPMENT (W4-W6)

University

10 Qs

Understanding Email, Contacts and Calendaring

Understanding Email, Contacts and Calendaring

University

10 Qs

BB

BB

University

10 Qs

Tree and Planar Graph

Tree and Planar Graph

University

10 Qs

CodeMonkey for B.Ed IT

CodeMonkey for B.Ed IT

University

10 Qs

Tips en Mantenimiento

Tips en Mantenimiento

11th Grade - University

10 Qs

STM10163_T1:INTRODUCTION TO DATABASE CONCEPT

STM10163_T1:INTRODUCTION TO DATABASE CONCEPT

University

10 Qs

JRB2 Quiz 4

JRB2 Quiz 4

University

10 Qs

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

Lecture1-Quiz1 Cybersecurity Awareness (Introduction)

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Vasaka Visoottiviseth

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

9 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lucas successfully hacked to a company via a security vulnerability on their website. He did not damage or steal the data but just leave a message to the admin to fix the website bug.
Lucas is considered as what type of hacker?

Black Hat

White Hat

Grey Hat

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one is NOT in the AAA model?

Access Control

Authentication

Authorization

Accounting

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The AAA model is used to ensure which principles of security?

C

I

A

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which process keeps track of what users do, including what they access?

Encryption

Authentication

Authorization

Accounting

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When you enter the hotel room by using the access card, this one is considered as authentication by using which of the below?

What You Know

What You Have

What You Are

What You Feel

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The One-Time-Password (OTP) you got via an SMS is considered as authentication by which one?

What You Know

What You Have

What You Are

What You See

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Authentication by using both the password and an access card is considered as Multi-factor Authentication (MFA) ?

TRUE

FALSE

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data Backup is used to protect which principles of security?

C

I

A

9.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hashing is used to protect which principles of security?

C

I

A