[Spring 25] Cybersecurity Final Exam

[Spring 25] Cybersecurity Final Exam

10th Grade

30 Qs

quiz-placeholder

Similar activities

Executive Branch Quiz

Executive Branch Quiz

11th Grade

25 Qs

MATEMATIKA KELAS 5 SD NEGERI II MOTOLING

MATEMATIKA KELAS 5 SD NEGERI II MOTOLING

9th - 12th Grade

25 Qs

Stage 19 Test

Stage 19 Test

10th Grade

25 Qs

ServSafe Chapter 3 Review

ServSafe Chapter 3 Review

9th - 12th Grade

25 Qs

The End of the Cold War

The End of the Cold War

11th Grade

25 Qs

Repaso Examen de JA Americas temas # 3, #4, #5, #6

Repaso Examen de JA Americas temas # 3, #4, #5, #6

6th Grade - University

35 Qs

ES Test Chapter 1

ES Test Chapter 1

11th Grade

25 Qs

Unit 2 Test - Budgeting Study Guide

Unit 2 Test - Budgeting Study Guide

9th - 12th Grade

25 Qs

[Spring 25] Cybersecurity Final Exam

[Spring 25] Cybersecurity Final Exam

Assessment

Quiz

others

10th Grade

Easy

Created by

Bryce Trout

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social ______ is the concept of using relationships, persuasion, and body language to steal some otherwise secretive/personal information or persuade someone to perform some action.
construction
engineering
reconnaissance
distortion

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

3 Way Handshake Contains the following:
SYN
SYN/ACK
ACK
TROUT
BLT

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?
The activity of catching fish, either for food or as a sport
Probabilistic Hierarchy Identification System Hacking
An attempt to gain sensitive information through electronic communication
None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a sign of a phishing attack?
A certified letter
Misspelled words
Changes in font
Odd graphics

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a phishing attempt directed at a specific target?
Spear phishing
Bulk phishing
Whaling
Clone phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Credential harvesting can be exploited via which type of cyberattack?
Phishing
Adversary-in-the-middle
DNS Poisoning
All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clicking on a hijacked link could lead to ______.
data being encrypted
MAC addresses being changed
malware getting installed
a Denial of Service attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?