Cybersecurity Test

Cybersecurity Test

Professional Development

20 Qs

quiz-placeholder

Similar activities

DIAGNOSTICO CIBERSEGURIDAD

DIAGNOSTICO CIBERSEGURIDAD

Professional Development

15 Qs

Understanding Cybersecurity Threats

Understanding Cybersecurity Threats

Professional Development

20 Qs

Cyber Security

Cyber Security

Professional Development

15 Qs

DT IT Security Awareness Quiz

DT IT Security Awareness Quiz

Professional Development

16 Qs

Malware Identification Quiz

Malware Identification Quiz

Professional Development

20 Qs

Network Security and Protocols Quiz

Network Security and Protocols Quiz

Professional Development

15 Qs

IT Test

IT Test

Professional Development

15 Qs

DCP Utilization and Maintenance

DCP Utilization and Maintenance

Professional Development

25 Qs

Cybersecurity Test

Cybersecurity Test

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Mlandvo John Shongwe

Used 3+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unauthorized access to control over computer network security systems


Security

Hacking

Surfing


Phishing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a strong password?

Your name or birthday

123456b

The word “PasSsword”


A long, complex mix of letters, numbers, and symbols

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is a hacktivist


A hacktivist is a hacker who uses their skills for political activism.

A hacktivist is a type of computer virus

A hacktivist is someone who hacks for personal gain.

A hacktivist is a government employee who monitors online activity.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens in a Man-in-the-Middle (MITM) attack?

Someone sends you spam emails

Someone guesses your password

Someone deletes your files


Someone interrupts and listens to your conversation without you knowing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes the primary purpose and behavior of spyware?

Spyware blocks access to websites to enforce parental controls.

Spyware secretly collects information about your activities without your consent and sends it to a third party


Spyware encrypts your files and demands payment to restore access.

Spyware scans your computer for viruses and removes them automatically.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a "gray hat" hacker?

A gray hat hacker only tests systems with explicit permission.
A gray hat hacker is always a malicious hacker.
A gray hat hacker is a hacker who may exploit a system without permission but does not have malicious intent.
A gray hat hacker only works for government agencies.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt


Fraudulent emails or messages that trick users into revealing sensitive data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?