LINKS Cyber Youth Challenge - Round 3

LINKS Cyber Youth Challenge - Round 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

Microsoft IT Pro Meetup - July

Microsoft IT Pro Meetup - July

Professional Development

15 Qs

How Cyber Safe Are You? Part 2

How Cyber Safe Are You? Part 2

Professional Development

10 Qs

Mitre Att&ck Quiz

Mitre Att&ck Quiz

Professional Development

15 Qs

26.12.2024 | Minigame TeamViewer

26.12.2024 | Minigame TeamViewer

Professional Development

8 Qs

Social Engineering

Social Engineering

Professional Development

5 Qs

M365 for Education Quiz

M365 for Education Quiz

Professional Development

13 Qs

Ethical hacking Kali linux Part 1

Ethical hacking Kali linux Part 1

Professional Development

10 Qs

SysOps Evaluation 2

SysOps Evaluation 2

Professional Development

11 Qs

LINKS Cyber Youth Challenge - Round 3

LINKS Cyber Youth Challenge - Round 3

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Imane Benkhelifa

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does the ‘Least Privilege’ principle ensure in cybersecurity?

Users have admin access by default

Users only have access necessary to perform their job

All users share the same access rights

Privileges are inherited from their manager

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

What does ‘Blue Team’ refer to in a cybersecurity context?

Offensive hackers simulating real-world attacks

Developers integrating security into software

Defensive team that monitors and responds to incidents

Team that performs vulnerability scanning

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the most secure method of password storage?

Plain text

Base64 encoding

Hashing with salt

Encrypting with a static key

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which protocol is used for secure file transfer over SSH?

FTP

TFTP

SFTP

SCP

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the main risk of a misconfigured DNS server?

Delays in email delivery

Unauthorized zone transfers

Weak encryption of web traffic

Increased bandwidth usage

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Which of the following attacks does a CAPTCHA mainly prevent?

SQL Injection

Brute-force login attacks

Session hijacking

Buffer overflow

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What kind of cyberattack exploits the trust between two systems?

DoS

MITM (Man-in-the-Middle)

Spoofing

Replay

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?