Cyber Security Essentials 4th August 2025

Cyber Security Essentials 4th August 2025

University

10 Qs

quiz-placeholder

Similar activities

Cybersecurity Attacks

Cybersecurity Attacks

University

10 Qs

Cybersecurity Awareness

Cybersecurity Awareness

University

10 Qs

Cybersecurity Fundamentals Week 3 Quiz

Cybersecurity Fundamentals Week 3 Quiz

KG - University

10 Qs

Chapter 1 quizzes

Chapter 1 quizzes

University

13 Qs

Malware

Malware

University

7 Qs

Type of Attacks

Type of Attacks

University

9 Qs

Rise of the bots | Exit Quiz | Oak National Academy

Rise of the bots | Exit Quiz | Oak National Academy

8th Grade - University

5 Qs

Cyberbezpieczeństwo

Cyberbezpieczeństwo

University

11 Qs

Cyber Security Essentials 4th August 2025

Cyber Security Essentials 4th August 2025

Assessment

Quiz

Computers

University

Medium

Created by

Udhayakumar Shanmugam

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

DDoS

is a malicious cyberattack where multiple compromised computer systems, often forming a botnet, flood a targeted server, service, or network with a massive amount of traffic.

a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed

is a type of malicious cyber attack where an attacker tricks a user into performing actions on a website that they are already authenticated on, without the user's knowledge or consent.

is a cyberattack that exploits vulnerabilities in Application Programming Interfaces (APIs) to achieve malicious objectives.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DNS query flood denial of service attacks mainly .....................................sector, that accounts for more than 40% of all sectors

Financial

Healthcare

Telecom

Social media

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

..................................................... are groups of criminals who unite to carry out cyber attacks in support of political causes. They typically target entire industries but sometimes attack specific organizations who they feel don't align with their political views or practices.

Ethical Hackers

Hacktivists

Activist

Cyber Ciriminals

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In 2024, ...............................acted as a primary coordination and communication hub for

hacktivist groups, largely due to its anonymity features and lenient moderation.

Twitter

Facebook

Telegram

Signal

Whatsapp

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The surge in AI technologies gave rise to sophisticated ................. bots, which

aggressively scrape data to train AI models—often without explicit permission

“grey”

"bad"

“black”

“White”

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

.............................videos are media, typically videos, that are digitally manipulated or created using artificial intelligence to make it appear as if someone is doing or saying something they never did. These videos are often highly realistic, making them difficult to distinguish from genuine footage, and can be used to spread misinformation, create false narratives, or even impersonate individuals.

Proxy

Fake

Deepfake

Morphed

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An API, which stands for ..........................................................................., is a set of rules and protocols that allows different software applications to communicate and interact with each other.

Application Programming Interface

Application Programming Interchange

Application Process Interface

Android Programming Interface

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?