Hero

Hero

12th Grade

6 Qs

quiz-placeholder

Similar activities

Cybersecurity Quiz for Tech Integrators

Cybersecurity Quiz for Tech Integrators

12th Grade

10 Qs

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

12th Grade

10 Qs

Cyber Security Solutions

Cyber Security Solutions

9th - 12th Grade

11 Qs

Online Security

Online Security

12th Grade

10 Qs

Cybersecurity - Device Security

Cybersecurity - Device Security

9th - 12th Grade

10 Qs

Online Safety

Online Safety

6th - 12th Grade

11 Qs

Unit 1 Review

Unit 1 Review

8th - 12th Grade

10 Qs

Software - Common Utility Programs

Software - Common Utility Programs

3rd - 12th Grade

10 Qs

Hero

Hero

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Quizizz Content

FREE Resource

6 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which activity involves the use of Open-Source Intelligence (OSINT)?

Social engineering testing

Data analysis of logs

Collecting evidence of malicious activity

Producing IOC for malicious artifacts

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Before granting application access to contractors and employees, what risk element should the implementation team evaluate?

Threshold

Appetite

Avoidance

Register

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

An attacker discovers a user's password by analyzing patterns in old password dumps. What type of attack is this?

A. Dictionary

B. Brute-force

C. Credential stuffing

D. Rainbow table

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A cybersecurity analyst detects traffic coming from a single internal host with multiple destination ports on a single external IP. What’s most likely happening?

A. DNS poisoning

B. Port scanning

C. MAC spoofing

D. URL redirection

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A user receives an email that appears to come from their IT department asking them to reset their password. What’s this attack called?

Phishing

Impersonation

Smishing

Vishing

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is the purpose of salting passwords before storing them in a database?

To speed up hash comparisons

To prevent rainbow table attacks

To lengthen the hash value

To comply with password reuse policies