
LINKS Cyber Youth Challenge - Round 4
Authored by Imane Benkhelifa
Information Technology (IT)
Professional Development

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following best describes a supply chain attack?
Targeting end users directly
Exploiting vulnerabilities in updates
Phishing employees
SQL Injection
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is the main function of a SIEM system?
Prevent attacks
Encrypt data
Monitor and analyze security events
Manage credentials
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which protocol is commonly used to secure email communication?
FTP
SMTP
SSL
S/MIME
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
In TLS, what role does the handshake play?
Encrypts the entire session
Validates data integrity
Negotiates encryption settings and authenticates parties
Scans malware
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is the purpose of sandboxing in malware analysis?
Detect vulnerabilities
Prevent phishing
Isolate and observe behavior
Encrypt suspicious files
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Which of the following is an example of a zero-day vulnerability?
A patched bug
A known misconfiguration
A newly discovered flaw not yet fixed
A network scanning tool
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
What is privilege escalation?
User logs in
Network congestion
Gaining higher access than permitted
Sending spam
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?