7daysago

Squizie 133th

21 years old - Châteauneuf-sur-isère



Classic
Quiz Sciences
Sciences
15 QUESTIONS
Q1. Which combination of zones provides attackers the widest range of potential exploits?
A) Users and devices
B) Users, devices, networks, cloud
C) Firewalls and antivirus
Q2. Which type of cyber threat involves deliberate disruption of system operations by internal staff?
A) Human error
B) Sabotage
C) Natural disaster
Q3. Which statement correctly describes internal vs external threats?
A) Internal threats are always accidental; external threats are intentional
B) Internal threats originate from within the organization, external threats from outside
C) Both internal and external threats only exploit software vulnerabilities

Threats & Malware

0 played - 6 days ago

Based on Cisco Cybersecurity Essentials module 1 and 2 (obviously you don't need to read them)

Medium QUIZ 15 QUESTIONS
medium
Classic
Quiz Sciences
Sciences
15 QUESTIONS
Q1. Which is an example of a complex attack vector?
A) Phishing email with embedded malware
B) Dos attack
C) Physical firewall installation
Q2. Data Loss Prevention (DLP) is effective because it :
A) Automatically deletes sensitive files
B) Controls data across multiple channels
C) Encrypts only network traffic
Q3. What makes TCP reliable compared to UDP?
A) Packet sequencing, acknowledgments, and retransmission
B) Faster transmission
C) Smaller headers

Link Protocols, Wi-Fi & Firewalls

0 played - 6 days ago

Based on Cisco Cybersecurity Essentials module 3, 4, 5, 6

Medium QUIZ 15 QUESTIONS
medium