QNAYDS

/10

Scholarship Test

1 / 10

1. Which of the following is a common type of cyber attack that involves overwhelming a service with traffic?

2 / 10

2. What technology is used to create virtual machines?

3 / 10

3. What does API stand for?

4 / 10

4. Which protocol is used to secure communication over the internet?

5 / 10

5. Which of the following is NOT a type of malware?

6 / 10

6. What does IoT stand for?

7 / 10

7. What does the acronym "VPN" stand for?

8 / 10

8. What is the primary purpose of a firewall in network security?

9 / 10

9. What is the primary purpose of an IP address?

10 / 10

10. What is two-factor authentication (2FA)?

0%

Scroll to Top