
Cyber security threat Video quiz
Interactive Video
•
Computers
•
University
•
Practice Problem
•
Hard
Jerry Jackson Bent
Used 4+ times
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes cyber security?
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Cyber attacks that use deceitful emails to obtain a person's personal information is called what?
(a)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main function of a Firewall?
To monitor and filter network traffic based on security rules.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the narrator, which of the attacks against Ann was the easiest?
Phishing
Password
Man in the Middle attack
Virus
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The full meaning of APT is?
Advanced Persistent Threats
Advance Passive Threats
Adverse Persistent Threats
Adverse Persuasive Threats
6.
OPEN ENDED QUESTION
3 mins • 1 pt
What attack do organizations suffer when their servers are flooded with too many malicious requests in an attempt to make it's services unavailable?
Evaluate responses using AI:
OFF
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the type of cyber attack where a hacker's system takes over the client's IP address?
DDOS
Phishing
Man in the Middle (MITM)
Virus
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?