Créer jeu
Obtenir Plan Académique

Cyber Shield Quiz

Froggy Jumps

Cybersecurity basics

Téléchargez la version pour jouer sur papier

0 fois fait

Créé par

United Kingdom

Top 10 résultats

Il n'y a toujours pas de résultats pour ce jeu. Soyez le premier à apparaître dans le classement! pour vous identifier.
Créez votre propre jeu gratuite à partir de notre créateur de jeu
Affrontez vos amis pour voir qui obtient le meilleur score dans ce jeu

Top Jeux

  1. temps
    but
  1. temps
    but
temps
but
temps
but
 
game-icon

Froggy Jumps

Cyber Shield QuizVersion en ligne

Cybersecurity basics

par Josh Pearson
1

What is the primary purpose of a firewall?

2

What does MFA stand for?

3

Which is a common phishing sign?

4

Which protocol provides encrypted web traffic?

5

What is ransomware?

6

Which is a strong password practice?

7

Which is a secure way to remote into a system?

8

What is social engineering?

9

Which tool helps detect suspicious network activity?

10

What is zero trust security primarily about?

11

Which type of malware hides in legitimate software?

12

What is a DDoS attack?

13

Which practice helps protect data at rest?

14

What is a VPN primarily used for?

15

Which is a strong method of user authentication?

16

What does a security audit involve?

17

Which attack exploits input handling?

18

What is data leakage?

19

Which device should be secured to reduce risk?

20

What is phishing?

21

Which security principle minimizes trusted access?

22

What is a digital signature?

23

Which is a secure way to dispose of data?

24

What does TLS provide?

25

Which password policy is recommended?

26

What is incident response?

27

Which control reduces success of brute force attacks?

28

What is a security patch?

29

Which is a common endpoint security measure?

30

What does data minimization mean?

31

Which term describes data that can't be altered?

32

Which protocol is insecure for remote login?

33

What is a security incident ticket?

34

Which practice improves password security?

35

Which is a threat vector?

36

What does encryption do?

37

Which security model grants access by role?

38

What is a security operation center?

39

Which attack targets passwords through dashboards?

40

What is data backup importance?

41

Which element is part of CIA triad?

42

What is endpoint detection and response?

43

Which is a strong network access control method?

44

What is a security false positive?

45

Which is a phishing-resistant MFA method?

46

What is telemetry in security context?

47

Which is an example of data at rest encryption?

48

What is a man-in-the-middle attack?

49

Which security framework is widely used in enterprises?

50

What is a honeypot in cybersecurity?

51

Which is a common IoT security risk?

52

What does threat modeling do?