[Spring 25] Cybersecurity Final Exam

[Spring 25] Cybersecurity Final Exam

10th Grade

30 Qs

quiz-placeholder

Similar activities

Test 1: Treaty of Versailles Quiz

Test 1: Treaty of Versailles Quiz

10th Grade

25 Qs

Measurement & What is Science?

Measurement & What is Science?

7th Grade - University

25 Qs

Digital Technology Quiz

Digital Technology Quiz

11th Grade

31 Qs

Unit 5: Post Test: Spreadsheets and Databases

Unit 5: Post Test: Spreadsheets and Databases

9th - 12th Grade

25 Qs

AVID Midterm Exam Review

AVID Midterm Exam Review

9th - 12th Grade

25 Qs

Online Threats Quiz

Online Threats Quiz

12th Grade

31 Qs

PAT TEKNOLOGI PERKANTORAN 2023

PAT TEKNOLOGI PERKANTORAN 2023

10th Grade

33 Qs

Sistemas Operativos I ExtraOrdinario 2024

Sistemas Operativos I ExtraOrdinario 2024

11th Grade

33 Qs

[Spring 25] Cybersecurity Final Exam

[Spring 25] Cybersecurity Final Exam

Assessment

Quiz

others

10th Grade

Easy

Created by

Bryce Trout

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social ______ is the concept of using relationships, persuasion, and body language to steal some otherwise secretive/personal information or persuade someone to perform some action.
construction
engineering
reconnaissance
distortion

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

3 Way Handshake Contains the following:
SYN
SYN/ACK
ACK
TROUT
BLT

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?
The activity of catching fish, either for food or as a sport
Probabilistic Hierarchy Identification System Hacking
An attempt to gain sensitive information through electronic communication
None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a sign of a phishing attack?
A certified letter
Misspelled words
Changes in font
Odd graphics

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a phishing attempt directed at a specific target?
Spear phishing
Bulk phishing
Whaling
Clone phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Credential harvesting can be exploited via which type of cyberattack?
Phishing
Adversary-in-the-middle
DNS Poisoning
All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clicking on a hijacked link could lead to ______.
data being encrypted
MAC addresses being changed
malware getting installed
a Denial of Service attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?