Cyber attack types, defenses & Laws (Cybersecurity Quiz)

Cyber attack types & defenses & Laws (Cybersecurity Quiz)

Please complete your lecture/lab by instructor & then attempt this quiz to test your knowledge on “Cyber attack types, defenses & Laws

Please enter your email:

1. A weakness in the system is called as:

 
 
 
 

2. Cybersecurity laws are strict for companies. Therefore, only companies need to follow the Cybersecurity laws. Individuals can bypass them if needed.

 
 

3. Phishing falls under which type of Security attacks?

 
 
 
 

4. Virus, worms & spyware fall under which category of Cyber attacks?

 
 
 
 

5. The mechanism to take advantage of a vulnerability is called as:

 
 
 
 

6. Acquiring information without direct interaction with targets and victims, is called as:

 
 

7. Main types of Cryptography are:

 
 
 
 

8. Nmap, Maltego, WHOIS & JTR (John-the-Ripper) are used for reconnaissance attacks:

 
 

9. Which type of data is lost in Reconnaissance Attacks?

 
 
 
 

10. Which type of Cyber attacks can be stopped by reducing the network visibility?

 
 
 
 

 

 

 

 

 

You might also be interested in our free Online Quizzes on all IT topics including Cisco CCNA, Cyber Security, Python Programming, Linux & Ethical Hacking:

Free Online Quizzes (Best for Cisco CCNA, Huawei HCNA, N+)

You can also view free study notes (Cheat sheets) for long term memory:

Networkwalks Summary Cheatsheets

Follow our Facebook Page & YouTube Channel for more updated Cheatsheets & Quizzes:

 

0 0 votes
Article Rating
Subscribe
Notify of
guest

1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
BAAFI EBENEZER

Good program