AEGIS Cyber Quiz

AEGIS Cyber Quiz

University

15 Qs

quiz-placeholder

Similar activities

Quis SIG

Quis SIG

University

20 Qs

Animation Techniques Quiz

Animation Techniques Quiz

10th Grade - University

10 Qs

Web Application - PHP Repetition

Web Application - PHP Repetition

University

15 Qs

Quiz Profesi dan Ketrampilan Bidang TKJ

Quiz Profesi dan Ketrampilan Bidang TKJ

10th Grade - University

10 Qs

Mid Exam

Mid Exam

12th Grade - University

20 Qs

Data Security

Data Security

12th Grade - University

17 Qs

Math G7 Chapter 3 Mastering Significant Figures and Estimation

Math G7 Chapter 3 Mastering Significant Figures and Estimation

7th Grade - University

20 Qs

FINALS summative test in TRENDS

FINALS summative test in TRENDS

12th Grade - University

20 Qs

AEGIS Cyber Quiz

AEGIS Cyber Quiz

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

Aegis SRM_IST

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What is the term for a cyber attack where users are tricked into revealing personal information via fake emails?

DDoS

Brute-force

Phishing

Spoofing

2.

MULTIPLE CHOICE QUESTION

45 sec • 5 pts

The CIA triad's three core principles are...?

Control, Integrity, Authentication

Confidentiality, Integrity, Availability

Cybersecurity, Information, Access

Confidentiality, Investigation, Auditing

3.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What process verifies the identity of a user or system?

Authorization

Encryption

Authentication

Auditing

4.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

An attack that tries many password combinations is called a...?

DDoS attack

Phishing attack

Brute-force attack

Man-in-the-middle attack

5.

MULTIPLE CHOICE QUESTION

45 sec • 10 pts

What is a 'sandbox' in cybersecurity?

A tool for analyzing network traffic

A safe environment to run and observe suspicious code

A knowledge base of adversary tactics

A system for managing digital certificates

6.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What type of malware locks your files and demands a payment to unlock them?

Spyware

Virus

Worm

Ransomware

7.

MULTIPLE CHOICE QUESTION

30 sec • 5 pts

What kind of attack floods a system with traffic to exhaust its resources?

SQL Injection

Man-in-the-Middle

DDoS

Zero-day

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?