Cyber Security Essentials 4th August 2025

Cyber Security Essentials 4th August 2025

University

10 Qs

quiz-placeholder

Similar activities

Python Quiz

Python Quiz

University

15 Qs

Learning AI and issues

Learning AI and issues

University

15 Qs

CSC305: TOPIC 2

CSC305: TOPIC 2

University

15 Qs

GK Quiz

GK Quiz

University

15 Qs

Java Quiz 4

Java Quiz 4

University

15 Qs

System Analysis & Design

System Analysis & Design

University

10 Qs

Visual Basic 2010

Visual Basic 2010

8th Grade - University

10 Qs

Member Onboarding

Member Onboarding

University

10 Qs

Cyber Security Essentials 4th August 2025

Cyber Security Essentials 4th August 2025

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Udhayakumar Shanmugam

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DDoS

is a malicious cyberattack where multiple compromised computer systems, often forming a botnet, flood a targeted server, service, or network with a massive amount of traffic.

a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed

is a type of malicious cyber attack where an attacker tricks a user into performing actions on a website that they are already authenticated on, without the user's knowledge or consent.

is a cyberattack that exploits vulnerabilities in Application Programming Interfaces (APIs) to achieve malicious objectives.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DNS query flood denial of service attacks mainly .....................................sector, that accounts for more than 40% of all sectors

Financial

Healthcare

Telecom

Social media

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..................................................... are groups of criminals who unite to carry out cyber attacks in support of political causes. They typically target entire industries but sometimes attack specific organizations who they feel don't align with their political views or practices.

Ethical Hackers

Hacktivists

Activist

Cyber Ciriminals

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In 2024, ...............................acted as a primary coordination and communication hub for

hacktivist groups, largely due to its anonymity features and lenient moderation.

Twitter

Facebook

Telegram

Signal

Whatsapp

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The surge in AI technologies gave rise to sophisticated ................. bots, which

aggressively scrape data to train AI models—often without explicit permission

“grey”

"bad"

“black”

“White”

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.............................videos are media, typically videos, that are digitally manipulated or created using artificial intelligence to make it appear as if someone is doing or saying something they never did. These videos are often highly realistic, making them difficult to distinguish from genuine footage, and can be used to spread misinformation, create false narratives, or even impersonate individuals.

Proxy

Fake

Deepfake

Morphed

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An API, which stands for ..........................................................................., is a set of rules and protocols that allows different software applications to communicate and interact with each other.

Application Programming Interface

Application Programming Interchange

Application Process Interface

Android Programming Interface

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?