LINKS Cyber Youth Challenge - Round 3

LINKS Cyber Youth Challenge - Round 3

Professional Development

10 Qs

quiz-placeholder

Similar activities

Implikasi UU PDP terhadap penerapan cybersecurity di Bank

Implikasi UU PDP terhadap penerapan cybersecurity di Bank

Professional Development

10 Qs

AZ-500 Module-1 GSI

AZ-500 Module-1 GSI

Professional Development

15 Qs

TECHNOLOGY

TECHNOLOGY

Professional Development

5 Qs

WhiteBelt Session - Secure Coding - OWASP Top 10

WhiteBelt Session - Secure Coding - OWASP Top 10

Professional Development

10 Qs

Network Security and Protocols Quiz

Network Security and Protocols Quiz

Professional Development

15 Qs

Digital Literacy E 2

Digital Literacy E 2

Professional Development

7 Qs

IoT Security & Trust_Quiz 1

IoT Security & Trust_Quiz 1

Professional Development

10 Qs

CDAC - Password Cracking

CDAC - Password Cracking

Professional Development

10 Qs

LINKS Cyber Youth Challenge - Round 3

LINKS Cyber Youth Challenge - Round 3

Assessment

Quiz

Information Technology (IT)

Professional Development

Hard

Created by

Imane Benkhelifa

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does the ‘Least Privilege’ principle ensure in cybersecurity?

Users have admin access by default

Users only have access necessary to perform their job

All users share the same access rights

Privileges are inherited from their manager

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

What does ‘Blue Team’ refer to in a cybersecurity context?

Offensive hackers simulating real-world attacks

Developers integrating security into software

Defensive team that monitors and responds to incidents

Team that performs vulnerability scanning

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the most secure method of password storage?

Plain text

Base64 encoding

Hashing with salt

Encrypting with a static key

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which protocol is used for secure file transfer over SSH?

FTP

TFTP

SFTP

SCP

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the main risk of a misconfigured DNS server?

Delays in email delivery

Unauthorized zone transfers

Weak encryption of web traffic

Increased bandwidth usage

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Which of the following attacks does a CAPTCHA mainly prevent?

SQL Injection

Brute-force login attacks

Session hijacking

Buffer overflow

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What kind of cyberattack exploits the trust between two systems?

DoS

MITM (Man-in-the-Middle)

Spoofing

Replay

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?