Cybersecurity Awareness Quiz

Create an image depicting a digital landscape filled with symbols of cybersecurity, such as locks, shields, and computer networks, with text elements like 'Cybersecurity Quiz' integrated into the design.

Cybersecurity Awareness Quiz

Test your knowledge on essential cybersecurity concepts with our comprehensive quiz! This 25-question challenge covers a wide range of topics such as:

  • Security Principles (CIA)
  • Attack Stages and Tools
  • Types of Privilege Escalation
  • Common Cyber Threats
  • Session Hijacking Techniques

Whether you’re a seasoned pro or just starting in the cybersecurity field, this quiz is designed to enhance your understanding and identify areas for improvement.

25 Questions6 MinutesCreated by SecureGuard101
Which doesn't form CIA triangle's three fundamental pillars of security?
Confidentiality
Integrity
Information Technology
Availability
Which tool is not used during Footprinting stage of attack?
WHOIS
Nslookup
Web-Based Tools
Password Cracking
Which doesn't form part of TCP scan types
Ping Scan
SYN Scan
ACK Scan
Real Scan
Which forms a TCP three way handshake when the connection is established?
SYN, SYN-ACK, ACK
FIN, ACK-FIN, ACK
FIN, ACK-ACK, ACK
SYN, SYN-SYN, ACK
Which forms a TCP three way handshake when the connection is terminated?
SYN, SYN-ACK, ACK
FIN, ACK-FIN, ACK
FIN, ACK-ACK, ACK
SYN, SYN-SYN, ACK
What is System Hacking?
Is the point at which an actual connection is made. It is the first true attack phase, breaking and entering by an attacker using the administrative connection or by an enumerated share.
Is the process of discovering each domain that is located within the LAN.
Is hiding a covert message within an overt message Security through obscurity
Is the discovering of open ports in network
Which doesn't form part of Password crackers?
John the ripper
Hydra
Cain
Abel
What is a Dictionary attack?
Is using the list of commonly used passwords
Is focusing on dictionary
Is making sure that you have a dictionary all the time
Is using a dictionary to steal a computer
What is Vertical privilege escalation?
Acquiring administrative privileges
Acquiring access to another account's files
Sitting in a Vertical position while guessing passwords
Using a Vertical program to hack a machine
What is Horizontal privilege escalation?
acquiring administrative privileges
Acquiring access to another account's files
Sitting in a Horizontal position while guessing passwords
Using a Horizontal program to hack a machine
What does Ransomware do?
Requires one to by a machine
Locks your computer and demands payment to unlock it.
Demands money for passwords
Locks the computer
What does Tunneling virus do?
Tunnels the virus
Sends a virus to a machine
Actively alters and corrupts service call interruptions
Moves fast over the natwork
What does Macro virus do?
It goes undetected by anti-virus
It is distributed through USB's
Required a Macro money to be deleted
Infects Microsoft Office files
What is Piggybacking/Tailgating?
Following someone closely through a secure entrance
A transparent iframe in front of the URL
Modifying host configuration files or exploiting DNS
URL misspelled or similar to the actual domain name
What is Pharming?
Following someone closely through a secure entrance
Modifying host configuration files or exploiting DNS
URL misspelled or similar to the actual domain name
A transparent iframe in front of the URL
Phishing is when.......
A transparent iframe in front of the URL
you Follow someone closely through a secure entrance
URL misspelled or similar to the actual domain name
You modify host configuration files or exploiting DNS
What is Dumpster diving?
Looking for useful information in the trash
Following someone closely through a secure entrance
Modifying host configuration files or exploiting DNS
Is the cracking of passwords
What is the Denial of Service?
Looking for useful information in the trash
Modifying host configuration files or exploiting DNS
Is the cracking of passwords
Is a special type of attack that brings a system offline compromised or otherwise makes a host’s service unavailable to legitimate users.
Which doesn't form DoS common strategies?
Ping of Death
Smurf
SYN Flood
Ping of best
What is spoofing?
Looking for useful information in the trash
Spoofing is an act of masquerading or impersonating as another user, whereas session hijacking tries to attack and take over an existing connection.
Is a special type of attack that brings a system offline compromised or otherwise makes a host’s service unavailable to legitimate users.
Modifying host configuration files or exploiting DNS
What is session Hijacking?
Modifying host configuration files or exploiting DNS
Is a special type of attack that brings a system offline compromised or otherwise makes a host’s service unavailable to legitimate users.
Looking for useful information in the trash
Session hijacking attacks can range differently from basic sniffing, to capture the traffic of an authenticated traffic between a client and server, to hijacking the established session to fool the server into thinking it has an authenticated session with the server.
What doesn't form part of session Hijacking steps?
The attacker must be able to track and intercept the traffic
The attacker must be able to desynchronize the connection
The attacker must be able to inject his traffic in place of the victim’s
The attacker must be able to touch a machine
Which is not a type of session hijacking?
Passive Session Hijacking
Active Session Hijacking
TCP Concepts
Malware session Hijacking
Which is not a Web Server Scanning tool?
Nmap
Netscan Tools
Superscan
Cain
Which is not type of Web Server Attacks?
IPP Printer Overflow
Directory Listing
Shoveling the Shell
Dictionary attack
{"name":"Cybersecurity Awareness Quiz", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Test your knowledge on essential cybersecurity concepts with our comprehensive quiz! This 25-question challenge covers a wide range of topics such as:Security Principles (CIA)Attack Stages and ToolsTypes of Privilege EscalationCommon Cyber ThreatsSession Hijacking TechniquesWhether you’re a seasoned pro or just starting in the cybersecurity field, this quiz is designed to enhance your understanding and identify areas for improvement.","img":"https:/images/course2.png"}
Powered by: Quiz Maker