Quizzes, Questions & Answers
Recent Quizzes
Do you think you know enough about security issues in C code? Can you think with the mind of a hacker?
Test your knowledge with our interactive quiz! Check how much you know, share the results, and help your colleagues...
Questions: 10 | Attempts: 702 | Last updated: Mar 21, 2023
-
Sample QuestionThis function is part of a program that is running on a 32-bit x86 system; the compiler does not change the order of variables on the stack. void function(char *input) { int i = 1; char buffer[8]; int j = 2; strcpy(buffer,input); printf("%x %x %s\n",i,j,buffer); } What is the minimum length of a string – passed to the function through the input parameter – that can crash the application?
Explore the essentials of Internet Safety with this quiz focusing on the dangers lurking online, such as identity disguise on social networks, phishing scams, and cyberbullying. Understand how to protect yourself in digital...
Questions: 8 | Attempts: 384 | Last updated: Mar 21, 2023
-
Sample QuestionWhen targeting victims, dangerous criminals disguise their identities on social network sites.
Do you think you know enough about security issues in C code? Can you think with the mind of a hacker?
Test your knowledge with our interactive quiz! Check how much you know, share the results, and help your colleagues...
Questions: 5 | Attempts: 276 | Last updated: Mar 21, 2023
-
Sample QuestionThis function is part of a program that is running on a 32-bit x86 system; the compiler does not change the order of variables on the stack. void function(char *input) { int i = 1; char buffer[8]; int j = 2; strcpy(buffer,input); printf("%x %x %s\n",i,j,buffer); } What is the minimum length of a string – passed to the function through the input parameter – that can crash the application?
Happy Security Awareness Month! There’s no better time to educate yourself – or reassure your existing knowledge, as the case may be – about the dos and don’ts of security and being safe with computers....
Questions: 25 | Attempts: 526 | Last updated: Mar 22, 2023
-
Sample QuestionIt's safe to open e-mail attachments and click on e-mail links, even if the message is from someone you don't know.
The August 2012 Mindshare: CPG quiz focuses on new systems for tracking device logins at Gartner, proper use of the Proxy Tool, and security procedures in password management. It assesses knowledge on maintaining secure access...
Questions: 10 | Attempts: 124 | Last updated: May 1, 2024
-
Sample QuestionGartner recently implemented a new system to track device logins to gartner.com.
This is a set of CDC 3D053 trivia Questions on Cyber Surety. In the world today a lot of the communication takes place over the internet or computer thus are susceptible to distortion. In the course we got how to safeguard air...
Questions: 52 | Attempts: 207 | Last updated: Mar 19, 2023
-
Sample QuestionWhich communications security (COMSEC) tier generates, distributes, and performs account functions of all modern key, physical traditional key, and certain electronic key?
Think your a bit of a quizz whizz? Then test your knowledge with these tough questions. How safe do you actually think you are?
Questions: 10 | Attempts: 596 | Last updated: Mar 21, 2023
-
Sample QuestionWhich of these passwords is most secure?
Here is a quick and interesting 'What's your malware analysis process' quiz designed to assess your malware analysis skills and help you learn something new. Do you know everything about malware analysis? There is...
Questions: 10 | Attempts: 11196 | Last updated: Mar 26, 2024
-
Sample QuestionWhat are the two most common phases of malware analysis?
This quiz titled '3DX5X Vol 1 -- Random Questions' assesses knowledge in various Air Force cybersecurity roles, focusing on AFSC classifications, responsibilities in data management, and Air Force Information Assurance program....
Questions: 100 | Attempts: 1167 | Last updated: Mar 20, 2023
-
Sample QuestionWhich AFSC is primarily concerned with the function of handling data, information, and knowledge-sharing services? Also concerning the management of the Air Force Portal.
This quiz assesses knowledge in Cyber Systems Operations, focusing on key computer components and their functions, including CMOS, RAM, ROM, BIOS, and interrupt systems. It is designed for Air Force personnel, enhancing readiness...
Questions: 100 | Attempts: 1335 | Last updated: Mar 20, 2023
-
Sample QuestionWhich original components were very susceptible to damage from electrostatic discharge?
Advertisement