Cyber attack types, defenses & Laws (Cybersecurity Quiz)

Cyber attack types & defenses & Laws (Cybersecurity Quiz)

Please enter your email:

1. Main types of Cryptography are:

 
 
 
 

2. The mechanism to take advantage of a vulnerability is called as:

 
 
 
 

3. A weakness in the system is called as:

 
 
 
 

4. Which type of data is lost in Reconnaissance Attacks?

 
 
 
 

5. Hashing is which type of Cryptography methodology?

 
 
 

6. Acquiring information without direct interaction with targets and victims, is called as:

 
 

7. Phishing falls under which type of Security attacks?

 
 
 
 

8. Nmap, Maltego, WHOIS & JTR (John-the-Ripper) are used for reconnaissance attacks:

 
 

9. Which type of Cyber attacks can be stopped by reducing the network visibility?

 
 
 
 

10. Virus, worms & spyware fall under which category of Cyber attacks?

 
 
 
 

 

 

 

 

 

You might also be interested in our free Online Quizzes on all IT topics including Cisco CCNA, Cyber Security, Python Programming, Linux & Ethical Hacking:

Free Online Quizzes (Best for Cisco CCNA, Huawei HCNA, N+)

You can also view free study notes (Cheat sheets) for long term memory:

Networkwalks Summary Cheatsheets

Follow our Facebook Page & YouTube Channel for more updated Cheatsheets & Quizzes:

 

Written by 

0 0 votes
Article Rating
Subscribe
Notify of
guest

1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
BAAFI EBENEZER

Good program