Cyber mid2

Cyber mid2

University

50 Qs

quiz-placeholder

Similar activities

AHJ: U6 Data Privacy and Security

AHJ: U6 Data Privacy and Security

12th Grade - University

50 Qs

OSI Layer

OSI Layer

12th Grade - University

48 Qs

Cybersecurity Quiz

Cybersecurity Quiz

11th Grade - University

47 Qs

Quiz ( SIL )

Quiz ( SIL )

University

45 Qs

Domain 2 - Network Security

Domain 2 - Network Security

10th Grade - University

55 Qs

Information Security model exam

Information Security model exam

University

50 Qs

CompTIA ITFundamentals CRAM

CompTIA ITFundamentals CRAM

6th Grade - University

46 Qs

MidExam InfoAssuSec2

MidExam InfoAssuSec2

University

50 Qs

Cyber mid2

Cyber mid2

Assessment

Quiz

Computers

University

Medium

Created by

Динара Альменбетова

Used 4+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the purpose of encryption keys?

  • Increase server bandwidth

  • Enable access to encrypted data

  • Speed up database queries

  • Enhance data compression

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which protocol is vulnerable to DNS reflection attacks?

  • FTP

  • UDP

  • TCP

  • SMTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is an HTTPS flood?

  • A malware injection

  • An attack on encrypted traffic

  • An advanced VPN attack

  • A method of encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which attack exploits vulnerabilities in SQL databases?

  • Phishing attack

  • SQL injection

  • DDoS attack

  • Keylogger attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the goal of multi-factor authentication (MFA)?

  • Require multiple forms of verification

  • Monitor unauthorized devices

  • Disable encryption protocols

  • Automate login processes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is a WPA3 improvement over WPA2?

  • Lower battery usage

  • Easier password recovery

  • Better network bandwidth

  • Enhanced encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the purpose of a vulnerability scanner?

  • a) Disable unauthorized devices

  • b) Monitor network speed

  • c) Encrypt all user data

  • d) Identify potential security weaknesses

  • Disable unauthorized devices

  • Monitor network speed

  • Encrypt all user data

  • Identify potential security weaknesses

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?