Hero

Hero

12th Grade

6 Qs

quiz-placeholder

Similar activities

Baze de date-Design

Baze de date-Design

12th Grade

10 Qs

BTEC Level 3 Nat Ext Dip in Computing - Unit 2.1 Hardware and Software

BTEC Level 3 Nat Ext Dip in Computing - Unit 2.1 Hardware and Software

11th - 12th Grade

10 Qs

Keyboarding Terms

Keyboarding Terms

9th - 12th Grade

10 Qs

Functions & NameSpace in Python -1

Functions & NameSpace in Python -1

12th Grade

10 Qs

UTP Cable

UTP Cable

12th Grade - University

10 Qs

loga

loga

12th Grade

9 Qs

Do you know alot about Roblox?

Do you know alot about Roblox?

2nd Grade - University

10 Qs

Hero

Hero

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which activity involves the use of Open-Source Intelligence (OSINT)?

Social engineering testing

Data analysis of logs

Collecting evidence of malicious activity

Producing IOC for malicious artifacts

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Before granting application access to contractors and employees, what risk element should the implementation team evaluate?

Threshold

Appetite

Avoidance

Register

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

An attacker discovers a user's password by analyzing patterns in old password dumps. What type of attack is this?

A. Dictionary

B. Brute-force

C. Credential stuffing

D. Rainbow table

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A cybersecurity analyst detects traffic coming from a single internal host with multiple destination ports on a single external IP. What’s most likely happening?

A. DNS poisoning

B. Port scanning

C. MAC spoofing

D. URL redirection

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A user receives an email that appears to come from their IT department asking them to reset their password. What’s this attack called?

Phishing

Impersonation

Smishing

Vishing

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is the purpose of salting passwords before storing them in a database?

To speed up hash comparisons

To prevent rainbow table attacks

To lengthen the hash value

To comply with password reuse policies

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?