TEST OF APTITUDE

Create a dynamic and visually engaging landing page image that illustrates cybersecurity concepts, showing elements like malware, phishing, and data protection symbols, with a modern, colorful design.

Test Your Cybersecurity Knowledge

Welcome to the ultimate test of your cybersecurity and online safety knowledge! This quiz challenges you with 50 thought-provoking questions that cover a wide range of topics including malware, phishing, encryption, and more. Perfect for students, professionals, or anyone interested in improving their digital security skills.

Take this quiz to:

  • Assess your understanding of essential cybersecurity concepts.
  • Learn about the latest threats in the digital landscape.
  • Enhance your ability to protect yourself online.
50 Questions12 MinutesCreated by ExploreShield247
Susan_ a 15-year-old girl, loves spending her free time baking and cycling_ However: recently she has been spending all of her free time glued to the computer. She shows no interest in her hobbies anymore and looks depressed most of the time _ Her parents also noticed that whenever they enter her room, she quickly changes the computer screen_ Understandably: Susan's parents are worried about. What could be the reason for her behavior?
Unsolicited emails
Victim of online Child abuse
Too much pressure at school
Social engineering
Why the developp the OSI MODEL?
To share ressource
To understand how network run
To understand how network work
To work everywere whit computer
A newly established ITE S company plans to launch a website which enables its users to share pictures and videos With each other. Apart from this: users can also comment on these pictures and share them further. Under which of the following cloud categories will the company-s product come?
Private Cloud
Hybrid Cloud
Community cloud
Public Cloud
Which of the following terms refers to malicious software that is specifically built to target mobile phone to software systems?
Broken cryptography
Phishing
Mobile malware
Unmanaged application
Choose the correct statement from the following
An antivirus is not needed when a firewall filters SII ports
A personal firewall protects systems from Internet attacks to a certain extent
An antivirus eliminates the need for a firewall
A personal firewall will check email attachments for malware
Which of the following fundamental concepts of security,' refers to an action taken in advance to protect the system against threats or dangers?
Precaution
Nonrepudiation
Maintenance
Reaction
Certain software applications add or modify a particular feature in a browser. A few versions allow users to block ads: watch online videos: or IM with friends. What is this application called?
Cookies
ActiveX
Java
Extensions
Choose the correct statement
Security is only a One stage process
The skill level needed to conduct an exploit has decreased
Evolution of technology did little to increase ease Of use
Software flaws can be absolutely eliminated
Alex, the coach of Manchester United, called up Wayne, the captain of the team, to discuss the tactics they employ in the upcoming Champions League Final. The following day_ Alex received an email with the transcript of the conversation he had with Wayne. The sender of the email threatened to make Alex's tactics public, if he did not pay him $5000. Which form of mobile device attack was Alex a victim of?
Phishing
Social engineering
Man in the middle attack
Eavesdropping
This part of an email informs you about the address from where it came time of the message, date sent and the subject line. Identify the email part?
Body
Footer
Signature
Header
Tom, a 14-year-old boy has been chatting online with Adam, whom Tom assumes in 14 years old as well. Over the months, they build up a great ‘online’ friendship, playing online games, checking out EDEM websites, continuing with their friendly rivalry over football, and just taking about ‘guy’ stuff, When Adam invited Tom over to meet him, Tom was obviously excited. However, when Tom met Adam, he was shocked, as Adam turned out to be 35 years old man. Despite this shock, Tom entered Adam’s house, as he trusted him. Tom was having a great time playing PS3 with Adam, until the time Adam touched him inappropriately. Tom ran away from Adam’s house and did not know what to do. Which form of cyber-attack was Tom a victim of?
Social engineering
Phishing
Grooming
Pornography
Which privacy issue of clouds exposes users to the risk of their data being accessed by the cloud service provider without the user's consent?
Data migration
Data ownership
Data permanency
Data location
Susan downloaded a software from the Internet and installed it on her computer for watching movies online. After installing the software, she noticed that her PC was slowing down and was taking more time to open webpages. What could Susan do to solve this problem?
Install a latest antivirus software and scan her computer
Stop using wireless internet connection
Start using Ethernet
Choose a suitable encryption method
Which of the following terms refers to a collection of information that defines or describes the user and his or her interests?
Profile
Facebook group
Time line
Account settings
Raymond received an email from an official claiming to be from his bank The email requested Raymond to send his personal details since the customer database of the bank was being updated_ Up on confirmation from the bank_ Raymond was told that the bank had not sent any emails asking for the personal details of their customers. Which cyber-attack would Raymond have been a victim of if he had replied to the email?
Man in the middle attack
War driver
Phishing
Eavesdropping
Isaac is transferring all the data from his computer to an external drive as he wants to format his laptop_ While moving the data. He accidentally hits delete instead of cut on one of the files and without realizing: hit the enter key when the computer prompted to confirm his action. As the file was a huge one it did not go to the recycle bin and got permanently deleted_ type of data loss is this?
Computer virus
Human error
Hardware theft
Software failure
What does a lock icon symbolize besides a website name?
The website cannot be accessed without the site admin's permission
The website is not accessible at the moment
The website is a secure website
The website needs a password to be accessed
Duke is taking some of the best pictures he has yet as an amateur photographer in a pen drive to get his work assessed by an expert_ On the subway an unknown person picks his pocket Along with his wallet Duke also lost the pen drive "with his pictures. Since he had not made any more copies of those pictures, he lost them forever. What type of data loss is this?
Natural disaster
Malware attack
Software theft
Hardware theft
Trojans are otherwise known as
Backdoors
Virus
Worm
Troy
Which of the following terms refers to software that attackers create to install on a victim's computer in order to compromise its security?
Lockbin
Drop box
Bitlocker
Malware
In asymmetric encryption…………
Two private keys are used
Two public keys are used
Similar keys are used
A public and private key is used
Which of the following refers to the patching of system files to fix any issues in the previous version of the windows os?
Windows firewall
Task manager
File vault
Windows Updates
What is Regedt32.exe?
Registered editor for 32 bit systems
Registry editor
Registered event viewer
Registered editor for windows
Sam uses his work laptop to watch pirated movies at home sometimes_ When he tried to watch the latest movie he downloaded: the movie file did not play even after trying on several different players. Within a day of this: Sam noticed that many of his files were vanishing one after the other from his laptop even though neither he nor anyone else deleted them_ The network administrator of his company: after taking a look at his computer told him that the movie files: which did not play: definitely had something to do With this peculiar behavior_ What type of data loss could this be?
Human error
Natural disaster
Software failure
Computer virus
Lucy, a 55-year-old woman: was not a technically savvy person. She did not install or enable any applications on her computer, and only used it for looking up recipes and knitting patterns. After some time, Lucy 's computer staffed giving her problems_ It often displayed the Blue Screen of Death (BSOD) and unwanted windows kept popping up whenever she went online. When a computer technician checked Lucy 's computer, it was discovered that her computer was infected with malware. Which inbuilt Windows software should Lucy have enabled to prevent malware infection in her computer?
Windows Defender
Jump lists
Simple file sharing
Task manager
Which of the following option would you choose to secure e-mail messages?
Digital photograph
Digital signature
Digital autograph
Digital vote
Daniel, a bank officer: communicates with his clients through emails on a daily basis. Recently: he noticed that his Gmail inbox was filled with unsolicited emails. The cluttered inbox annoyed him: as it was difficult to filter the important emails_ Hence: he decided to find a solution for it_ Upon inquiry_ a service provider told him that he could use software which automatically filters out the unsolicited emails_ This software would not only protect his Gmail account: but also protect all the email accounts configured on his email client. Which of the following tools did Daniel probably enquire about?
SPAMfighter
Norton
Kaspersky
Avast Pro
Which of the following websites can Windows Phone users use to locate their stolen
ICloud.com
Http://vwm.symbianguru.com/tracking-mobile-with-phone-guardian.html
Account.microsoft.com/devices
Android.com/devicemanager
Which of the following statements is wrong regarding good password management?
Do not change passwords frequently
Do not share your passwords
Do not use easily guessable passwords
Do not Write down your passwords
What is a zombie machine?
A machine that does not respond to any instructions
A machine that accepts and acts On instructions from another machine
A machine that does not have a hard drive
A machine that is dependant On another machine for resources
Which of the following terms refers to the process that ensures accuracy of the sender and receiver of a message?
Data
Availability
Nonrepudiation
Authenticity
As part of his security implementation plan, Glenn was updating his firewall. Which aspect of the security implementation plan was Glenn working on?
Precaution
Nonrepudiation
Reaction
Maintenance
Harry. a 21-year-old college-gomg student, Was Working on his dissertation when suddenly a message flashed on his screen, ‘’All files on your computer have been encrypted, you must pay $1000 within 72 hours to regain access to your data,’’ Even after Harry paid the money: he was not able to access his data and all the documents on his dissertation were lost. Which malware attack was Harry a victim of?
Virus
Ransomware
Bootnet
Adware
Sarah has recently rented a small room on ABC Street, and Started a business with seven employees. She provided every employee with a computer and a common printer Which is meant to be shared by everyone. Which of the following networks would suit Sarah’s business need?
Virtual Private Network
Wide area network
Ethernet physical layer
Local Area Network
Susan downloaded a software the Internet and installed it on her computer for watching movies online. After installing the noticed that her PC Was slowing down and Was taking more time to open webpages What could Susan do to solve this problem?
Install a latest antivirus software and scan her computer
Start using Ethernet
Choose the suitable encryption method
Stop using wireless internet connection
Hermione is a 21 year-old college student_ She loves spending time on Facebook_ However: With her final exams approaching: she feels that spending time on Facebook will harm her exam results_ Hence: she enables a particular Facebook feature_ With the help of which_ she will not get any emails or notifications from Facebook_ Which Facebook feature did Hermione use?
Deactivate account
Where you're logged in
Login alerts
Who Can look me up
Which of the following antivirus technique refers to the process of comparing the current state of stored programs to a previously recorded state, which is known to be free of malware?
Integrity Checking
Scanning
Bookmarks method
Heuristics analysis
Samuel, a network admin in an IT firm_ has just discovered a phishing site known for targeting corporate entities_ Several employees have received emails with the domain name: which is the same as that of this site. In order to prevent the company's network from being corrupted: Samuel decides to block all incoming and outgoing traffic from that site. Which of the following defense mechanisms can Samuel use to implement this?
Firewall
Encryption
Virus
Disk encryption
Which of the following terms refers to the process of protecting information, and the infrastructure that stores it?
Data security
Maintenance
Keystroke logging
Availability
A new online service allows people living with roommates to feed in all their house hold expenses in its 'share calculator' program_ The program then calculates how much each person IS supposed to pay and sends a detailed report to all those who are listed as roommates for that particular transaction. The above mentioned service is an example of which of the following?
Software as a Service
Infrastructure as a Service
Platform as a Service
Network as a Service
Gareth's parent found him watching porn online on the new Mac they gave him on his birthday. The obviously do not want gareth to repeat this behavior. What action can gareth's parent take to ensure this.
Parental control
Vault
Time machine
Icould
Ruth Cole is a sales manager and travels extensively on business. She regularly updates and stores clients’ data on a remote data storage device via the Internet, so that in case she loses her laptop or it crashes for some reason, she does not lose the data which is essential to carrying out her work. Which type of data backup is Emma using to carry out her daily work?
Online data backup
Differential backup
Full system backup
Incremental backup
Imagine getting a letter from the Island Revenue Authority of Singapore (IRAS) demanding that you pay $5,700 in taxes. This is what happened to Rick. He received a letter informing him that he owed the government unpaid income tax on wages he never earned. The IRAS letter said that Rick had worked at several places. However, Rick is only 15 years old and only job was working at his uncle’s grocery store during the summer. He had never even visited some of the places where the letter said he worked. Rick was not sure what to do next. After all, he has never even had a ‘‘real’’ job like those listed in the letter. What is going on is this scenario?
Social engineering
Phishing
Nigerian scam
Identity Theft
Sally is a 16 year-old high school student who is extremely attached to her laptop. She uses it to download and watch episodes of her favorite sitcom. While watching one of the episode, her laptop switched off automatically a couple of times. Suspecting a malware infection, she opened the antivirus software on her laptop and choose a technique, which examined all files on the memory and hard disk in order to identify and locate the malware. Which antivirus technique did Sally employ?
Integrity checking
Bookmarks method
Heuristics analysis
Scanning
ABC Info Ltd. Has a part of its business already on a cloud computing platform. However, its new product suite would need a cloud service which runs on a totally different technology. The company should be able to make its legacy products and new products and new products communicate with each other as the new are just an upgrade of the old ones and much of the required data still resides on the old cloud. Which of the following cloud computing platforms will be suitable for ABC Info’s future needs?
Private cloud
Community cloud
Public cloud
Hybrid cloud
InfraTech Inc. Is an international IT company with offices in Dubai, Singapore, and Australia. To have continuity of business practice, it is imperative that all the branch offices be able to communicate amongst themselves. Which of the following network systems would be suitable for data communication between the employees of all branches of InfraTech Inc.?
Local Area Network
Wide Area Network
Ethernet
Virtual Private Network
XYZ I nfra Solutions, a startup company is looking for a cloud service provider who can provide virtual machines, virtual local area network, customized software applications, on demand storage, IP addresses, and firewalls to meet its business needs. Which of the following cloud computing services can meet the business needs of the company?
Infrastructure as a Service
Software as a Service
Platform as a Service
Application as a Service
You received the following email from an official claiming to be from your bank. Dear ABC Bank User, Since we will be updating our customer database shortly, you are kindly requested to send the following information. Name Bank login id Password Branch Date of birth Alternate email Please click the below link to update your details. Proceed to update your account details. Please contact the ABC Bank customer team in case of any queries. Thank you for your cooperation. Which type of email security threat is this?
Spy-phishing
Phishing
Nigerian Scam
Malicious email attachment
Which of the following is the strongest password?
Donna1992
Pa#72tLe
Donnamike92
Domike*
A new online service allows people living with roommates to feed in all their house hold expenses in its ‘share calculator’ program. The program then calculates how much each person is supposed to pay and sends a detailed report to all those who are listed as roommates for that particular transaction. The above mentioned service is an example of which of the following?
Software as a Service
Infrastructure as a Service
Platform as a Service
Network as a Service
{"name":"TEST OF APTITUDE", "url":"https://www.supersurvey.com/QPREVIEW","txt":"Welcome to the ultimate test of your cybersecurity and online safety knowledge! This quiz challenges you with 50 thought-provoking questions that cover a wide range of topics including malware, phishing, encryption, and more. Perfect for students, professionals, or anyone interested in improving their digital security skills.Take this quiz to:Assess your understanding of essential cybersecurity concepts.Learn about the latest threats in the digital landscape.Enhance your ability to protect yourself online.","img":"https:/images/course1.png"}
Make your own Survey
- it's free to start.