Cyber Security

What does the “https://” at the beginning of a URL denote, as opposed to "http://" (without the “s”)?
That information entered into the site is encrypted
That the site is not accessible to certain computers
That the site is the newest version available
None of the above
Which of the following is an example of a 'phishing attack'?
Sending someone an email that contains a malicious link that is disguised to look like an email from someone the person knows
Creating a fake website that looks nearly identical to a real website in order to trick users into entering their login information
Sending someone a text message that contains a malicious link that is disguised to look like a notification that the person has won a contest
All of the above
A group of computers that is networked together and used by hackers to steal information is called a …
Operating System
Botnet
DDoS- Distributed Denial of Service
Rootkit
Which of the following passwords is the strongest?
John123456
18122014
Did_7654*
Aly1996
The practice of hackers driving around an area looking for insecure Wi-Fi networks is known as what?
Ransomware
Spamming
Driving
Hacking
If a public Wi-Fi requires a password to access, it is generally safe to use for sensitive activities such as online banking.
True
False
By turning off the GPS function alone of your smartphone it prevents any tracking of your phone's location?
Yes, turning off the GPS function is enough.
No, it is not enough because smartphones can be tracked using cellphone towers or Wi-Fi networks it is connected to.
This is a type of malicious software designed to gain unauthorised access to a Computer System. What is it?
DDoS- Distributed Denial of Service
Botnet
Spam
Rootkit
This is an attack where large amounts of requests are sent to a web server in order to overwhelm the server and shut it down. What is it?
Spam
DDoS- Distributed Denial of Service
Rootkit
Botnet
What kind of cyber security risks can be minimised by using a Virtual Private Network (VPN)?
Phishing attacks
Data Hacking
Use of insecure Wi-Fi networks
None of the above
{"name":"Cyber Security", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What does the “https:\/\/” at the beginning of a URL denote, as opposed to \"http:\/\/\" (without the “s”)?, Which of the following is an example of a 'phishing attack'?, A group of computers that is networked together and used by hackers to steal information is called a …","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker