Cybersecurity Attacks Quiz

Cybersecurity Attacks Quiz

University

19 Qs

quiz-placeholder

Similar activities

Algoritma Pemrograman

Algoritma Pemrograman

10th Grade - University

20 Qs

ĐỀ CƯƠNG ÔN TẬP CUỐI HỌC KÌ 2 LỚP 5

ĐỀ CƯƠNG ÔN TẬP CUỐI HỌC KÌ 2 LỚP 5

5th Grade - University

20 Qs

Artificial Intelligence: What's going on ?! Speedy Quiz !

Artificial Intelligence: What's going on ?! Speedy Quiz !

University

15 Qs

BAB 6 ANALISIS DATA B. Perkakas Pengolah Lembar Kerja

BAB 6 ANALISIS DATA B. Perkakas Pengolah Lembar Kerja

7th Grade - University

20 Qs

Understanding Database Technologies, Relational Model, and Data

Understanding Database Technologies, Relational Model, and Data

University

20 Qs

Big Data бойынша тест

Big Data бойынша тест

University

20 Qs

Digitalization and Development

Digitalization and Development

University

20 Qs

Cybersecurity Attacks Quiz

Cybersecurity Attacks Quiz

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

Mark Feguro

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is an attack in the context of cybersecurity?

An attempt to destroy or alter an asset

A method of securing data

A type of software

A network protocol

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What distinguishes an active attack from a passive attack?

Passive attacks are illegal; active attacks are legal

Active attacks modify data; passive attacks do not

Active attacks are less harmful than passive attacks

Active attacks are easier to detect than passive attacks

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a Man-In-The-Middle (MITM) attack?

An attack where the attacker relays communication between two parties

An attack that uses brute force to guess passwords

An attack that involves social engineering

An attack that targets network hardware

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a brute-force attack?

An attempt to guess passwords by trying many combinations

An attack that uses social engineering techniques

An attack that involves altering data

An attack that targets network infrastructure

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary goal of a Smurf attack?

To render computer networks inoperable

To steal sensitive information

To gain unauthorized access to a system

To modify data in transit

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What protocol does a Fraggle attack use?

HTTP

TCP

ICMP

UDP

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a dictionary attack?

An attack that targets network hardware

An attack that modifies data

An attack that uses social engineering

An attack that tries all dictionary words as passwords

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?