Cybersecurity Knowledge Assessment

Cybersecurity Knowledge Assessment

University

25 Qs

quiz-placeholder

Similar activities

VR STEM World - Computer Science Fundamentals

VR STEM World - Computer Science Fundamentals

1st Grade - Professional Development

20 Qs

Information Security Quiz

Information Security Quiz

University

21 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

System Vulnerabilities

System Vulnerabilities

University

20 Qs

Network and Internet Security

Network and Internet Security

University

20 Qs

040_An Overview of Malware – CompTIA Security+ SY0-701

040_An Overview of Malware – CompTIA Security+ SY0-701

9th Grade - University

20 Qs

Test blanc

Test blanc

University

20 Qs

CIA Triad Quiz

CIA Triad Quiz

University

20 Qs

Cybersecurity Knowledge Assessment

Cybersecurity Knowledge Assessment

Assessment

Quiz

Computers

University

Hard

Created by

VedaSri Tutorials

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of User Access Control?

To simplify the user interface for easier navigation.

To restrict access to resources based on user permissions.

To enhance user productivity by providing more access.

To monitor user activity for security purposes.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Choose incorrect statement (s):

A)The main types of Malware are viruses, worms, trojans, ransomware, spyware, adware, and rootkits. B) They can be prevented by using antivirus software, keeping systems updated, avoiding suspicious downloads, employing firewalls, and educating users.

c) NIDS is check inside the personal system for worms and also prevents them if found

A only

B only

C only

all are incorrect

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Read the following and find out the incorrect match of protocol and its use :

1) SSL/TLS : Encrypts data over the internet;

2) IPsec: Secures IP communications;

3) SSH: Provides secure remote access.

4) FTP : creates web pages

All are correct

All are incorrect

1,2&3 are Correct and 4 is incorrect

1,2 & 3 are incorrect and 4 is correct

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain Two-Factor Authentication and its importance.

Two-Factor Authentication only requires a password to access accounts. it is used only in stock markets not in other sectors

Two-Factor Authentication is primarily used for social media accounts. and it is used in public sector Factories

Two-Factor Authentication is a method to encrypt data during transmission.

Two-Factor Authentication enhances security by requiring two forms of verification, significantly reducing the risk of unauthorized access.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify and describe three types of cyber attacks.

A)Phishing

B) Denial-of-Service (DoS)

C) Key-logging

D) Malware

E) Ransomware

A,C,E

A,B,E

B,C,D

A,D,E

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the Budapest Convention and its significance in cyber-security?

Select Correct options :

A) The Budapest Convention is the first international treaty on cybercrime.

B) It promotes cooperation and legal standards for combating cybercrime.

C) it is an agreement for international trade in cybersecurity tools.

D) A national law specific to Hungary regarding internet usage.

A, B only

B,C only

C, D only

A,D only

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is there a need for a nodal agency for cyberspace management?

To focus solely on private sector cybersecurity initiatives.

To promote individual cybersecurity measures without coordination.

To ensure coordinated cybersecurity efforts and effective incident management.

To reduce the number of cybersecurity professionals needed.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?