[Spring 25] Cybersecurity Final Exam

[Spring 25] Cybersecurity Final Exam

10th Grade

30 Qs

quiz-placeholder

Similar activities

Quiz#3: Different Ethical Issues on Print Media

Quiz#3: Different Ethical Issues on Print Media

University

27 Qs

Unit 1 Test - Managing Personal Finances

Unit 1 Test - Managing Personal Finances

9th - 12th Grade

25 Qs

HHB 3.6 Specific Cellular Defences against Pathogens

HHB 3.6 Specific Cellular Defences against Pathogens

11th Grade

25 Qs

Busca Encuentra Sabe

Busca Encuentra Sabe

9th - 12th Grade

25 Qs

EMPOWER REVIEWER

EMPOWER REVIEWER

11th Grade

35 Qs

Digital Technology Quiz

Digital Technology Quiz

11th Grade

31 Qs

AVID Midterm Exam Review

AVID Midterm Exam Review

9th - 12th Grade

25 Qs

AP Lang Unit Test Review

AP Lang Unit Test Review

11th Grade

25 Qs

[Spring 25] Cybersecurity Final Exam

[Spring 25] Cybersecurity Final Exam

Assessment

Quiz

others

10th Grade

Easy

Created by

Bryce Trout

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Social ______ is the concept of using relationships, persuasion, and body language to steal some otherwise secretive/personal information or persuade someone to perform some action.
construction
engineering
reconnaissance
distortion

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

3 Way Handshake Contains the following:
SYN
SYN/ACK
ACK
TROUT
BLT

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?
The activity of catching fish, either for food or as a sport
Probabilistic Hierarchy Identification System Hacking
An attempt to gain sensitive information through electronic communication
None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is NOT a sign of a phishing attack?
A certified letter
Misspelled words
Changes in font
Odd graphics

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a phishing attempt directed at a specific target?
Spear phishing
Bulk phishing
Whaling
Clone phishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Credential harvesting can be exploited via which type of cyberattack?
Phishing
Adversary-in-the-middle
DNS Poisoning
All of the above

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clicking on a hijacked link could lead to ______.
data being encrypted
MAC addresses being changed
malware getting installed
a Denial of Service attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?