Cybersecurity 101

Cybersecurity 101

Professional Development

11 Qs

quiz-placeholder

Similar activities

Dia 4 Webinar Hackers vs Empresas

Dia 4 Webinar Hackers vs Empresas

Professional Development

10 Qs

CDAC - DOS and Trojan Quiz

CDAC - DOS and Trojan Quiz

Professional Development

15 Qs

Social engineering and social media use

Social engineering and social media use

Professional Development

6 Qs

Questionnaire

Questionnaire

Professional Development

7 Qs

Knowing the Cyber Threat

Knowing the Cyber Threat

Professional Development

6 Qs

Sharing Session - Security Operation

Sharing Session - Security Operation

Professional Development

15 Qs

Phishing

Phishing

Professional Development

16 Qs

Desafios em Cibersegurança

Desafios em Cibersegurança

Professional Development

10 Qs

Cybersecurity 101

Cybersecurity 101

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Jn Agu

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

practice of maintaining and following a set of regular habits and best practices to keep your digital environment secure, healthy, and free from Cyber Threats.

Cybersecurity

Data Security

Cyber Hygiene

Information Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

An attacker intercepts and alters communication between two parties.

Man-in-the-Middle Attack

Vishing

Denial of Service Attack

Impersonation

3.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

attacker sends a fake SMS message with a malicious link or phone number designed to steal personal data.

Phishing

Spear Phishing

Whaling

Smishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Individuals with wide range of skills who are motivated by religious or political beliefs

Cyber Terrorists

Hacktivist

Hacker Teams

Industrial Spies

5.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Individuals who use their professed hacking skills for defensive purposes.

Hacktivist

Black Hat

Gray Hat

White Hat

6.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

Cyberattack technique that manipulates people into revealing confidential information, clicking on malicious links, or performing actions that compromise security. Instead of hacking systems directly, attackers exploit human psychology to bypass security controls.

Impersonation

Social Engineering

Baiting

Phishing Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 2 pts

An attacker pretends to be someone else—like a colleague, boss, or authority figure—in order to manipulate others into performing actions, such as transferring funds or providing confidential information.

Pretexting

Impersonation

Baiting

Vishing

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?