a7, 916 PM Basie Cyber Security Test
Quizizz NAME
CLASS:
Basic Cyber Security Test
10 Questions DATE :
1. 1. Harmful programs used to disrupt computer operation, gather sensitive information,
or gain unauthorized access to computer systems are commonly referred to as
A| Malware B| Adware
| Ransomware D| Spyware
2. Atype of software that performs unwanted and harmful actions in disguise of a
legitimate and useful program is known as a Trojan horse. This type of malware may act
like a legitimate program and have all the expected functionalities, but apart from that it
will also contain a portion of malicious code that the user is unaware of.
A| False B] True
3. What is adware?
Malicious software that collects
A information about users without their B
knowledge
Malicious program that sends copies of
itself to other computers on the network
Software that automatically displays or
Unsolicited or undesired electronic
c D downloads advertising material such as
messages
banners or pop-ups when a user is online
4, Which of the answers listed below illustrates the difference between passive and active
security breach response?
Al UTMvs. Firewall B) IDSvs. IPS
| CSMA/CD vs. CSMA/CA D| HIPS vs. NIPS
5. Which is the following is not objectives of CyberSecurity:
A) Integrity B| Performance
C| Confidentiality D| Authentication
Intps:iquiziz convprinuquiztSc049s2fe90886001a713509 M4s1773, 916 PM
10,
Basie Cyber Security Test
Which of the following is not considered a violation of confidentiality?
Send Company email to personal mail [8| Destruction of Company Hardware
Sharing of company business secret with
D| Back up of Data to public cloud drive
non-employee
Ashley is reviewing a firewall configuration and finds the following four ports are exposed
to the world. Which one of these ports represents the greatest potential security risk?
22 B) 3389
443, Db} 2
Kevin recently received an encrypted message from his colleague, Kate. Kate encrypted
the message using an asymmetric encryption algorithm. What encryption key should he
use to decrypt the message?
Kate's public key B| Kevin's public key
Kate's private key D| Kevin's private key
Nancy is responsible for the administration of many different servers in her company.
Which one of the following tools can she use to gain command-line administrative access
to her Linux servers in a secure manner?
ROP B) SCP
Telnet D| ssH
‘An unauthorized practice of obtaining confidential information by manipulating people
into disclosing sensitive data is referred to as:
Privilege escalation B| Social engineering
Shoulder surfing D) Penetration testing
Intps:iquiziz convprinuquiztSc049s2fe90886001a713009 28s1773, 916 PM Basie Cyber Security Test
‘Answer Key
1a 2b 3d 40
5.b 6b Ta 8c
9a 10.
Intps:iquiziz convprinuquiztSc048s2fe90886001a713508 sias1773, 316 PM Basie Cyber Security Test
Intps:iquiziz convprinuquiztSc048s2fe90886001a713508 48