
LINKS Cyber Youth Challenge - Round 3
Authored by Imane Benkhelifa
Information Technology (IT)
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What does the ‘Least Privilege’ principle ensure in cybersecurity?
Users have admin access by default
Users only have access necessary to perform their job
All users share the same access rights
Privileges are inherited from their manager
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What does ‘Blue Team’ refer to in a cybersecurity context?
Offensive hackers simulating real-world attacks
Developers integrating security into software
Defensive team that monitors and responds to incidents
Team that performs vulnerability scanning
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the most secure method of password storage?
Plain text
Base64 encoding
Hashing with salt
Encrypting with a static key
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which protocol is used for secure file transfer over SSH?
FTP
TFTP
SFTP
SCP
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What is the main risk of a misconfigured DNS server?
Delays in email delivery
Unauthorized zone transfers
Weak encryption of web traffic
Increased bandwidth usage
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which of the following attacks does a CAPTCHA mainly prevent?
SQL Injection
Brute-force login attacks
Session hijacking
Buffer overflow
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
What kind of cyberattack exploits the trust between two systems?
DoS
MITM (Man-in-the-Middle)
Spoofing
Replay
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?