Cyber mid2

Cyber mid2

University

50 Qs

quiz-placeholder

Similar activities

ICT 51-100

ICT 51-100

University

50 Qs

IT alapismeretek

IT alapismeretek

10th Grade - Professional Development

49 Qs

MES3093: QUIZ

MES3093: QUIZ

University

50 Qs

Computer memory

Computer memory

University

45 Qs

PROJECT MANAGEMENT FINAL

PROJECT MANAGEMENT FINAL

University

50 Qs

PROTOCOLOS-1-ESPAÑOL

PROTOCOLOS-1-ESPAÑOL

University - Professional Development

52 Qs

ACTIVE DIRECTORY

ACTIVE DIRECTORY

University - Professional Development

50 Qs

CompTIA ITFundamentals CRAM

CompTIA ITFundamentals CRAM

6th Grade - University

46 Qs

Cyber mid2

Cyber mid2

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Динара Альменбетова

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the purpose of encryption keys?

  • Increase server bandwidth

  • Enable access to encrypted data

  • Speed up database queries

  • Enhance data compression

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which protocol is vulnerable to DNS reflection attacks?

  • FTP

  • UDP

  • TCP

  • SMTP

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is an HTTPS flood?

  • A malware injection

  • An attack on encrypted traffic

  • An advanced VPN attack

  • A method of encryption

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which attack exploits vulnerabilities in SQL databases?

  • Phishing attack

  • SQL injection

  • DDoS attack

  • Keylogger attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the goal of multi-factor authentication (MFA)?

  • Require multiple forms of verification

  • Monitor unauthorized devices

  • Disable encryption protocols

  • Automate login processes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is a WPA3 improvement over WPA2?

  • Lower battery usage

  • Easier password recovery

  • Better network bandwidth

  • Enhanced encryption

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. What is the purpose of a vulnerability scanner?

  • a) Disable unauthorized devices

  • b) Monitor network speed

  • c) Encrypt all user data

  • d) Identify potential security weaknesses

  • Disable unauthorized devices

  • Monitor network speed

  • Encrypt all user data

  • Identify potential security weaknesses

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?