[Spring 25] Cybersecurity Final Exam

[Spring 25] Cybersecurity Final Exam

10th Grade

30 Qs

quiz-placeholder

Similar activities

Los mejores  amigos

Los mejores amigos

12th Grade

25 Qs

11th - 12th Grade Student Math Survey

11th - 12th Grade Student Math Survey

11th Grade

25 Qs

Unit 2 Test- Banking

Unit 2 Test- Banking

9th - 12th Grade

25 Qs

Spanish II Chapter 4 Grammar Form n

Spanish II Chapter 4 Grammar Form n

9th - 12th Grade

25 Qs

Quarter 1 Final Exam

Quarter 1 Final Exam

11th Grade

25 Qs

PENILAIAN HARIAN SENI TARI KELAS 9

PENILAIAN HARIAN SENI TARI KELAS 9

9th Grade - University

25 Qs

Natural Resources & Climate Change Open Notes Assessment

Natural Resources & Climate Change Open Notes Assessment

9th Grade - University

25 Qs

[Spring 25] Cybersecurity Final Exam

[Spring 25] Cybersecurity Final Exam

Assessment

Quiz

others

10th Grade

Practice Problem

Easy

Created by

Bryce Trout

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social ______ is the concept of using relationships, persuasion, and body language to steal some otherwise secretive/personal information or persuade someone to perform some action.

construction
engineering
reconnaissance
distortion

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

3 Way Handshake Contains the following:

SYN
SYN/ACK
ACK
TROUT
BLT

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?

The activity of catching fish, either for food or as a sport
Probabilistic Hierarchy Identification System Hacking
An attempt to gain sensitive information through electronic communication
None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a sign of a phishing attack?

A certified letter
Misspelled words
Changes in font
Odd graphics

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a phishing attempt directed at a specific target?

Spear phishing
Bulk phishing
Whaling
Clone phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Credential harvesting can be exploited via which type of cyberattack?

Phishing
Adversary-in-the-middle
DNS Poisoning
All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clicking on a hijacked link could lead to ______.

data being encrypted
MAC addresses being changed
malware getting installed
a Denial of Service attack

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?