Skills Area Cyber Security Course Session 1 Activites

Skills Area Cyber Security Course Session 1 Activites

1st Grade

8 Qs

quiz-placeholder

Similar activities

Microsoft Dataverse Features Quiz

Microsoft Dataverse Features Quiz

1st Grade

11 Qs

Skills Area Cyber Security Course Session 1 Activites

Skills Area Cyber Security Course Session 1 Activites

Assessment

Quiz

Information Technology (IT)

1st Grade

Easy

Created by

Youseef Walid

Used 2+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The Cyber Security Is ..........................

strategies and techniques

Technology Development

Ethical Hacking Techniques

None Of Them

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

The Cyber Security Is Used to .........................

Hacking The Data

protects our information

Accses To Internet

Play Online Games

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

  What is The three principles of cybersecurity ............................

1.Confidentiality , 2.Integrity , 3.Availability

1.Avaliabilty , 2.Confidentiality , 3.Integrity

1.Confidentiality , 2.Avaliabilty , 3.Integrity

None Of Them

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

  At this stage, the hacker collects as much information as possible about the target  ........

Reconnaissance

ٍScaning

Clear Tracks

Gaining Access

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

  Here it starts by scanning systems and networks for vulnerabilities. For example: It searches for open ports or outdated software ..................

Reconnaissance

Ransomeware

Scaning

Clear Tracks

6.

MULTIPLE CHOICE QUESTION

20 sec • 6 pts

Testing conducted on websites and web applications to discover vulnerabilities  ..............

Mobile Testing

App Testing

Website Testing

IOS Testing

7.

MULTIPLE CHOICE QUESTION

10 sec • 14 pts

What is the most operating systems used in cyber security track...........

Kali Linux

MacOS

Windows Server

Windows 11

8.

MULTIPLE CHOICE QUESTION

20 sec • 9 pts

It is a working environment specifically designed to install side operating systems alongside the main system.........

Cisco Packet Tracer

Vritual Box

ZNMap

Metasploit