Crear
Obtener Plan Académico

Cyber Shield Quiz

Froggy Jumps

Cybersecurity basics

Descarga la versión para jugar en papel

0 veces realizada

Creada por

Reino Unido

Top 10 resultados

Todavía no hay resultados para este juego. ¡Sé el primero en aparecer en el ranking! para identificarte.
Crea tu propio juego gratis desde nuestro creador de juegos
Compite contra tus amigos para ver quien consigue la mejor puntuación en esta actividad

Top juegos

  1. tiempo
    puntuacion
  1. tiempo
    puntuacion
tiempo
puntuacion
tiempo
puntuacion
 
game-icon

Froggy Jumps

Cyber Shield QuizVersión en línea

Cybersecurity basics

por Josh Pearson
1

What is the primary purpose of a firewall?

2

What does MFA stand for?

3

Which is a common phishing sign?

4

Which protocol provides encrypted web traffic?

5

What is ransomware?

6

Which is a strong password practice?

7

Which is a secure way to remote into a system?

8

What is social engineering?

9

Which tool helps detect suspicious network activity?

10

What is zero trust security primarily about?

11

Which type of malware hides in legitimate software?

12

What is a DDoS attack?

13

Which practice helps protect data at rest?

14

What is a VPN primarily used for?

15

Which is a strong method of user authentication?

16

What does a security audit involve?

17

Which attack exploits input handling?

18

What is data leakage?

19

Which device should be secured to reduce risk?

20

What is phishing?

21

Which security principle minimizes trusted access?

22

What is a digital signature?

23

Which is a secure way to dispose of data?

24

What does TLS provide?

25

Which password policy is recommended?

26

What is incident response?

27

Which control reduces success of brute force attacks?

28

What is a security patch?

29

Which is a common endpoint security measure?

30

What does data minimization mean?

31

Which term describes data that can't be altered?

32

Which protocol is insecure for remote login?

33

What is a security incident ticket?

34

Which practice improves password security?

35

Which is a threat vector?

36

What does encryption do?

37

Which security model grants access by role?

38

What is a security operation center?

39

Which attack targets passwords through dashboards?

40

What is data backup importance?

41

Which element is part of CIA triad?

42

What is endpoint detection and response?

43

Which is a strong network access control method?

44

What is a security false positive?

45

Which is a phishing-resistant MFA method?

46

What is telemetry in security context?

47

Which is an example of data at rest encryption?

48

What is a man-in-the-middle attack?

49

Which security framework is widely used in enterprises?

50

What is a honeypot in cybersecurity?

51

Which is a common IoT security risk?

52

What does threat modeling do?