Categories: News

Cyber Security Training Assessment Test Questions and Answer – Halogen Test Questions

Are you looking for the Cyber Security Training Assessment Test Questions and Answers? Are you In search of the Halogen Cybersecurity training assessment test question and answers? Here are the correct answers to the FG cyber security online test questions and answers.

Cyber Security Training Assessment Test Questions and Answers

Instructions

  • Please complete section A and section B
  • A certificate of attendance will be issued to only individuals that pass this assessment.
  • Ensure that you complete and submit this assessment by 12 midnight, Monday 05 September 2022

 

. What is Cyber Security?

a) Cyber Security provides security against malware
b) Cyber Security provides security against cyber-terrorists
c) Cyber Security protects a system from cyber attacks
d) All of the above

 

2. What does cyber security protect?

a) Cyber security protects criminals
b) Cyber security protects internet-connected systems
c) Cyber security protects hackers
d) None of the above

 

3. Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, and other associated data information?

a) Cyber attack
b) Computer security
c) Cryptography
d) Digital hacking

 

4. Which of the following is a type of cyber security?

a) Cloud Security
b) Network Security
c) Application Security
d) All of the above

 

5. Which of the following is a type of cyber attack?

a) Phishing
b) SQL Injections
c) Password Attack
d) All of the above

 

6. Government sometimes hires some highly skilled hackers. These types of hackers are called _______

a) Special Hackers
b) Government Hackers
c) Cyber Intelligence Agents
d) Nation / State sponsored Hackers

 

7. Which of the following term refers to a group of hackers who are both white and black hat?

a) Yellow Hat hackers
b) Grey Hat hackers
c) Red Hat Hackers
d) White-Black Hat Hackers

 

8 ___________ is a special form of attack in which Hackers exploit human psychology

a) Cross Site Scripting
b) Insecure Network
c) Social Engineering
d) Reverse Engineering

 

9. Which of the following do NOT come under Social Engineering?

a) Malware
b) Phishing
c) Pretexting
d) Spamming

 

10. _________ is an act of hacking by means of which a political and/or social message is conveyed.

a) Hacktivism
b) Whistle-blowing
c) Surveillance
d) Pseudonymization

 

11. In IP address, IP is an abbreviated for __________

a) Internet Program
b) Internet Protocol
c) Intuition Programs
d) Internet Pathway

 

12. Hackers who help in finding bugs and vulnerabilities in a system do not intend to crack a system are termed as ________

a) Black Hat Hackers
b) White Hat Hackers
c) Grey Hat Hackers
d) Red Hat Hackers

 

13. An amateur or newbie in the field of hacking who does not have many skills about coding and in-depth working of security and hacking tools are called ________

a) Sponsored Hackers
b) Hactivists
c) Script Kiddies
d) Whistle Blowers

 

14. The TCP/IP model consists of how many layers?

a) One
b) Two
c) Three
d) Four

 

15. One of the following is an attack method used to inject code into the database of a system / website.

a) HTML injection
b) SQL Injection
c) Malicious code injection
d) XML Injection

 

16. Which of the following is NOT part of the CIA Triad

a) Confidentiality
b) Authority
c) Availability
d) Integrity

 

17. _____________ is the technique used for tricking users to disclose their username and passwords through fake pages.

a) Social Engineering
b) Phishing
c) Cookie Stealing
d) Banner Grabbing

 

18. Which of the following is NOT carried out by cyber criminals?

a) Unauthorized account access
b) Mass attack using Trojans as botnets
c) Email spoofing and spamming
d) Report vulnerability in any system

 

19. Who deploys Malwares to a system or network?

a) Criminal organizations, Black hat hackers, malware developers, cyber-terrorists
b) Criminal organizations, White hat hackers, malware developers, cyber-terrorists
c) Criminal organizations, Black hat hackers, software developers, cyber-terrorists
d) Criminal organizations, Gray hat hackers, Malware developers, Penetration testers

 

20. XSS is an abbreviation for  __________

a) Extreme Secure Scripting
b) Cross Site Security
c) Cross Site Scripting
d) Cross Site Writing
sparkgist

Recent Posts

Graduate Trainee Programme 2024/2025 in UK/US: Best Opportunities & How to Apply”

Graduate Trainee Programme 2024/2025 in UK /US - Highest paying and how to apply - List of ongoing graduate scheme…

1 day ago

List of Graduate Trainee Jobs in the UK 2024/2025 – Ongoing Graduate Trainee Schemes/Program and Closing Date

List of Graduate Trainee Jobs in the UK 2024/2025 - Ongoing Graduate Trainee Schemes/Program in UK-  UK Graduate Trainee Jobs…

1 day ago

How To Start Blogging in Nigeria – Steps in starting a blog site

Steps in starting a blog site - If the idea of launching your own blog in Nigeria has been on…

1 week ago

Abubakar Tafawa Balewa University (ATBU) Recruitment for University Librarian 2024

Abubakar Tafawa Balewa University (ATBU) Recruitment - Abubakar Tafawa Balewa University is a Federal Government-owned tertiary Institution located in Bauchi,…

1 week ago

University of Ilorin Teaching Hospital (UITH) Recruitment 2024 – (38 Positions)

University of Ilorin Teaching Hospital (UITH) Recruitment 2024 - Applications are hereby invited from suitably qualified candidates for employment in…

1 week ago

Lagos State University (LASU) Recruitment 2024 for Academic and Technical

Lagos State University (LASU) Recruitment 2024 for Academic and Technical - The Lagos State University (LASU), located at Ojo, was…

1 week ago