Cybersecurity Knowledge Assessment

Cybersecurity Knowledge Assessment

University

25 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz 1

Cybersecurity Quiz 1

University

20 Qs

Computer Networking

Computer Networking

University

20 Qs

TENTENTENTENENEN

TENTENTENTENENEN

University

25 Qs

Information Assurance and Security Finals Long Test

Information Assurance and Security Finals Long Test

University

30 Qs

Module 1.1: Common Threats

Module 1.1: Common Threats

11th Grade - University

25 Qs

Computer Security Measures

Computer Security Measures

11th Grade - University

20 Qs

INFO MNGT MIDTERM EXAM P1

INFO MNGT MIDTERM EXAM P1

University

20 Qs

Operating System Security Quiz

Operating System Security Quiz

University

20 Qs

Cybersecurity Knowledge Assessment

Cybersecurity Knowledge Assessment

Assessment

Quiz

Computers

University

Hard

Created by

VedaSri Tutorials

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of User Access Control?

To simplify the user interface for easier navigation.

To restrict access to resources based on user permissions.

To enhance user productivity by providing more access.

To monitor user activity for security purposes.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose incorrect statement (s):

A)The main types of Malware are viruses, worms, trojans, ransomware, spyware, adware, and rootkits. B) They can be prevented by using antivirus software, keeping systems updated, avoiding suspicious downloads, employing firewalls, and educating users.

c) NIDS is check inside the personal system for worms and also prevents them if found

A only

B only

C only

all are incorrect

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Read the following and find out the incorrect match of protocol and its use :

1) SSL/TLS : Encrypts data over the internet;

2) IPsec: Secures IP communications;

3) SSH: Provides secure remote access.

4) FTP : creates web pages

All are correct

All are incorrect

1,2&3 are Correct and 4 is incorrect

1,2 & 3 are incorrect and 4 is correct

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain Two-Factor Authentication and its importance.

Two-Factor Authentication only requires a password to access accounts. it is used only in stock markets not in other sectors

Two-Factor Authentication is primarily used for social media accounts. and it is used in public sector Factories

Two-Factor Authentication is a method to encrypt data during transmission.

Two-Factor Authentication enhances security by requiring two forms of verification, significantly reducing the risk of unauthorized access.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify and describe three types of cyber attacks.

A)Phishing

B) Denial-of-Service (DoS)

C) Key-logging

D) Malware

E) Ransomware

A,C,E

A,B,E

B,C,D

A,D,E

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Budapest Convention and its significance in cyber-security?

Select Correct options :

A) The Budapest Convention is the first international treaty on cybercrime.

B) It promotes cooperation and legal standards for combating cybercrime.

C) it is an agreement for international trade in cybersecurity tools.

D) A national law specific to Hungary regarding internet usage.

A, B only

B,C only

C, D only

A,D only

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is there a need for a nodal agency for cyberspace management?

To focus solely on private sector cybersecurity initiatives.

To promote individual cybersecurity measures without coordination.

To ensure coordinated cybersecurity efforts and effective incident management.

To reduce the number of cybersecurity professionals needed.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?