
Cybersecurity Quiz
Authored by Фируза Фируза
English
12th Grade
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
27 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The employees in a company receive an email stating that the account password will expire immediately and requires a password reset within 5 minutes. Which statement would classify this email?
It is a DDoS attack.
It is an impersonation attack.
It is a hoax.
It is a piggy-back attack.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack targets an SQL database using the input field of a user?
XML injection
buffer overflow
Cross-site scripting
SQL injection
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cyber criminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server to crash. What is the type of attack the cyber criminal launches?
SQL injection
packet Injection
man-in-the-middle
DoS
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first line of defense to protect a device from improper access control?
end user license agreement (EULA)
encryption
passwords
shredding
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security service company is conducting an audit in several risk areas within a major corporate client. What attack or data loss vector term would be used to describe providing access to corporate data by gaining access to stolen or weak passwords?
an internal threat
hard copy
improper access control
unencrypted devices
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A social media site is describing a security breach in a sensitive branch of a national bank. In the post, it refers to a vulnerability. What statement describes that term?
The likelihood that a particular threat will exploit a vulnerability of an asset and result in an undesirable consequence.
A weakness in a system or its design that could be exploited by a threat.
The actions that are taken to protect assets by mitigating a threat or reducing risk.
The potential damage to the organization that is caused by the threat.
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which three IPv4 header fields have no equivalent in an IPv6 header? (Choose three.)
TTL
fragment offset
identification
protocol
flag
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?