You are on page 1of 4
a7, 916 PM Basie Cyber Security Test Quizizz NAME CLASS: Basic Cyber Security Test 10 Questions DATE : 1. 1. Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as A| Malware B| Adware | Ransomware D| Spyware 2. Atype of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of. A| False B] True 3. What is adware? Malicious software that collects A information about users without their B knowledge Malicious program that sends copies of itself to other computers on the network Software that automatically displays or Unsolicited or undesired electronic c D downloads advertising material such as messages banners or pop-ups when a user is online 4, Which of the answers listed below illustrates the difference between passive and active security breach response? Al UTMvs. Firewall B) IDSvs. IPS | CSMA/CD vs. CSMA/CA D| HIPS vs. NIPS 5. Which is the following is not objectives of CyberSecurity: A) Integrity B| Performance C| Confidentiality D| Authentication Intps:iquiziz convprinuquiztSc049s2fe90886001a713509 M4 s1773, 916 PM 10, Basie Cyber Security Test Which of the following is not considered a violation of confidentiality? Send Company email to personal mail [8| Destruction of Company Hardware Sharing of company business secret with D| Back up of Data to public cloud drive non-employee Ashley is reviewing a firewall configuration and finds the following four ports are exposed to the world. Which one of these ports represents the greatest potential security risk? 22 B) 3389 443, Db} 2 Kevin recently received an encrypted message from his colleague, Kate. Kate encrypted the message using an asymmetric encryption algorithm. What encryption key should he use to decrypt the message? Kate's public key B| Kevin's public key Kate's private key D| Kevin's private key Nancy is responsible for the administration of many different servers in her company. Which one of the following tools can she use to gain command-line administrative access to her Linux servers in a secure manner? ROP B) SCP Telnet D| ssH ‘An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as: Privilege escalation B| Social engineering Shoulder surfing D) Penetration testing Intps:iquiziz convprinuquiztSc049s2fe90886001a713009 28 s1773, 916 PM Basie Cyber Security Test ‘Answer Key 1a 2b 3d 40 5.b 6b Ta 8c 9a 10. Intps:iquiziz convprinuquiztSc048s2fe90886001a713508 sia s1773, 316 PM Basie Cyber Security Test Intps:iquiziz convprinuquiztSc048s2fe90886001a713508 48

You might also like