IT Security - 03

IT Security - 03

University

20 Qs

quiz-placeholder

Similar activities

cyber awareness

cyber awareness

University

20 Qs

Itec285 End of Year

Itec285 End of Year

University

17 Qs

PL SQL

PL SQL

University - Professional Development

20 Qs

JDBC

JDBC

University

20 Qs

Exception handling -oracle plsql

Exception handling -oracle plsql

University

15 Qs

Cybersecurity & Ethical Hacking Quiz

Cybersecurity & Ethical Hacking Quiz

University

15 Qs

Fundamentals 18 Understanding DDoS Attacks

Fundamentals 18 Understanding DDoS Attacks

9th Grade - University

25 Qs

Vulnerability Research and Tools

Vulnerability Research and Tools

University

15 Qs

IT Security - 03

IT Security - 03

Assessment

Quiz

Computers

University

Easy

Created by

Kavini Amandi

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary goal of secure design?

To create stylish user interfaces

To react after attacks occur

To prevent, detect, and mitigate cyber threats proactively

To speed up software development

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a vulnerability?

A firewall setting

A type of antivirus software

A weakness in a system that can be exploited

An update to improve software

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a human-related vulnerability?

Buffer Overflow

Firmware Attack

Phishing

SQL Injection

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which technique is used in smishing attacks?

Emails

Voice calls

SMS messages

Social media ads

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the term for vulnerabilities that are unknown to developers and don’t yet have a patch?

Cross-site scripting

Zero-Day Vulnerabilities

API Misuse

Side-Channel Attacks

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is a type of software vulnerability?

Weak User Credentials

Cache Attack

SQL Injection

Data Remanence

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What does RBAC stand for?

Role-Based Access Control

Remote-Based Audit Control

Role-Bound Authentication Channel

Reliable Binary Access Code

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?