Cybersecurity Scenarios Quiz

Cybersecurity Scenarios Quiz

Professional Development

25 Qs

quiz-placeholder

Similar activities

Bootcamp Quiz 4-CSS

Bootcamp Quiz 4-CSS

Professional Development

20 Qs

5. SQL DML

5. SQL DML

Professional Development

20 Qs

Cybersecurity Fundamental Questions

Cybersecurity Fundamental Questions

Professional Development

20 Qs

Microsoft Intune - Pre-Assessment

Microsoft Intune - Pre-Assessment

Professional Development

20 Qs

Cyber Security Awareness

Cyber Security Awareness

Professional Development

20 Qs

Networking and Ethernet Quiz

Networking and Ethernet Quiz

Professional Development

20 Qs

Modern AI

Modern AI

Professional Development

20 Qs

Fundamentos de Computação e Hardware

Fundamentos de Computação e Hardware

Professional Development

20 Qs

Cybersecurity Scenarios Quiz

Cybersecurity Scenarios Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Medium

Created by

Adrian Henderson

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company experienced a phishing attack last month. Now, the IT team is meeting to discuss what went well and what could be improved in future incidents. What phase of incident response is this?

Identification

Containment

Lessons learned

Recovery

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybercriminal creates a fake invoice with hidden malware and emails it to a company employee. This action is part of which stage in the Cyber Kill Chain?

Reconnaissance

Weaponization

Delivery

Installation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to set up a system that can automatically block IP addresses when threats are detected and pull data from threat intelligence feeds. What solution is best for this?

SIEM

Firewall

SOAR

EDR

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You're troubleshooting a Linux server and want to capture real-time network packets to analyze strange traffic. What command-line tool should you use?

traceroute

tcpdump

netstat

ping

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You receive an email that looks like it’s from your company's CEO, but your DNS security shows the sender’s IP is not part of the company’s authorized email servers. What is the most likely issue?

Bad DNS entry

Email spoofing

Open relay

Email forwarding

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your team is analyzing a cyber attack. They create a chart that connects the attacker, tools used, network, and victim. What model are they using?

Kill Chain

MITRE ATT&CK

Diamond Model

STRIDE

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You notice that a user’s machine is making regular connections to an external IP address every 5 minutes. What is this behavior called?

Port scanning

Flooding

Beaconing

Tunneling

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?