Quiz Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
What is the goal of the āCyber Terroristā?
CorrectIncorrect -
Question 2 of 10
2. Question
Attacking systems by exploiting unknown and unpatched vulnerabilities is also known as:
CorrectIncorrect -
Question 3 of 10
3. Question
What is a common technique used by bad actors to steal credentials or to compromise computers?
CorrectIncorrect -
Question 4 of 10
4. Question
In the context of cybersecurity, which definition best describes social engineering?
CorrectIncorrect -
Question 5 of 10
5. Question
Which definition best describes personally identifiable information (PII)?
CorrectIncorrect -
Question 6 of 10
6. Question
Identify three examples of personally identifiable information (PII). (Choose three.)
CorrectIncorrect -
Question 7 of 10
7. Question
Which rule is best to follow for securing passwords?
CorrectIncorrect -
Question 8 of 10
8. Question
Which two characteristics are examples of poor passwords? (Choose two.)
CorrectIncorrect -
Question 9 of 10
9. Question
Complete the sentence. A social engineering attack that compromises public charging stations and installs malware when a portable device plugs in, is known as
CorrectIncorrect -
Question 10 of 10
10. Question
Which three activities pose a potential security threat to users? (Choose three.)
CorrectIncorrect