BT Cybersecurity
Quiz by Stefan Pricope
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
Which item is part of the CIA triad?
Correct
Authoritary
Indisputable
Confidentiality
30s - Q2
What is phishing?
An attack where malicious software executes code on a victim's system.
A type of attack meant to shut down a machine or network.
A common spelling mistake of the word "Fishing"
Phishing is a type of attack often used to steal user data.
30s - Q3
IPS and IDS perform the same roles.
falsetrueTrue or False30s - Q4
What does XSS stand for?
Cross Service Scripting
Cross Scanner Software
Cross Site Scripting
eXtra Scripting on Sites
30s - Q5
External emails containing malicious URLs or files are sent to your company. Where do you block them?
Web servers
Domain Controllers
Email gateway
SIEM
30s - Q6
Most common type of attack used in applications with a database backend.
CSRF
XSS
SQLi
HTML
30s - Q7
Which of these is not a security protection mechanism for email authenticity?
DMARC
SPF
DKIM
EDR
30s - Q8
Type of malware designed to encrypt files on a device and asking for money in exchange for decryption.
Users re-arrange answers into correct orderJumble45s - Q9
What are the stages of an attack?
Users link answersLinking45s - Q10
Associate each type of hacker with the right color hat.
Users sort answers between categoriesSorting60s - Q11
A WAF (Web Application Firewall) helps protect web applications by filtering and monitoring HTTP traffic between a web application and the Internet.
truefalseTrue or False30s - Q12
What does DDOS stand for?
Users re-arrange answers into correct orderJumble30s