Search Header Logo

Cybersecurity Quiz

Authored by Фируза Фируза

English

12th Grade

Used 3+ times

Cybersecurity Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

27 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The employees in a company receive an email stating that the account password will expire immediately and requires a password reset within 5 minutes. Which statement would classify this email?

It is a DDoS attack.

It is an impersonation attack.

It is a hoax.

It is a piggy-back attack.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack targets an SQL database using the input field of a user?

XML injection

buffer overflow

Cross-site scripting

SQL injection

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cyber criminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server to crash. What is the type of attack the cyber criminal launches?

SQL injection

packet Injection

man-in-the-middle

DoS

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first line of defense to protect a device from improper access control?

end user license agreement (EULA)

encryption

passwords

shredding

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security service company is conducting an audit in several risk areas within a major corporate client. What attack or data loss vector term would be used to describe providing access to corporate data by gaining access to stolen or weak passwords?

an internal threat

hard copy

improper access control

unencrypted devices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A social media site is describing a security breach in a sensitive branch of a national bank. In the post, it refers to a vulnerability. What statement describes that term?

The likelihood that a particular threat will exploit a vulnerability of an asset and result in an undesirable consequence.

A weakness in a system or its design that could be exploited by a threat.

The actions that are taken to protect assets by mitigating a threat or reducing risk.

The potential damage to the organization that is caused by the threat.

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which three IPv4 header fields have no equivalent in an IPv6 header? (Choose three.)

TTL

fragment offset

identification

protocol

  • flag

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?