Cybersecurity Concepts Worksheet

Cybersecurity Concepts Worksheet

University

55 Qs

quiz-placeholder

Similar activities

QUIS KONSEP BASIS DATA

QUIS KONSEP BASIS DATA

University

50 Qs

Gestión de la Continuidad del Negocio

Gestión de la Continuidad del Negocio

University

51 Qs

Кәсіби ағылшын 1 - 50

Кәсіби ағылшын 1 - 50

University

50 Qs

 COMPUTER SYSYTEMS SERVICING

COMPUTER SYSYTEMS SERVICING

10th Grade - University

55 Qs

Final Exam Review: Information Management

Final Exam Review: Information Management

University

51 Qs

C++ Programming Quiz (first)

C++ Programming Quiz (first)

University

52 Qs

PRELIM EXAM_INTERNET RESEARCH FOR BUSINESS

PRELIM EXAM_INTERNET RESEARCH FOR BUSINESS

University

55 Qs

Network+ Days 1 - 12

Network+ Days 1 - 12

University

60 Qs

Cybersecurity Concepts Worksheet

Cybersecurity Concepts Worksheet

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

n b

Used 1+ times

FREE Resource

55 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of inappropriate use?

Accessing a sensitive file without authorization

Using a work computer to browse social media for hours

Crashing a server with traffic

Spreading malware via email

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes an Unauthorized Access (UA) attack according to NIST?

A user accidentally deletes critical files

A hacker gains access to a system using stolen credentials

A website is overloaded with traffic

An employee forgets to log off a computer

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Denial-of-Service (DoS) attack?

An attempt to access data without permission

The theft of personal credentials via email

An attack that floods a system with traffic, making it unavailable

A program that spreads itself by copying to other programs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a Trojan Horse?

A fake email asking for a password

A virus that replicates on its own

A seemingly legitimate program that has hidden malware

A worm that disables antivirus software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which option defines a virus?

A self-replicating program that does not require user interaction

A deceptive email designed to steal credentials

A malicious program attached to a host file that requires user action

A hoax message used to trick users into deleting files

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a hoax?

A fake pop-up claiming a virus is detected

A self-replicating program

A network scanning tool

An email phishing for passwords

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common indicator of a DoS attack?

Unusual outbound email volume

Extremely slow network performance or service outages

Sudden increase in system logs

System clock changes unexpectedly

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?