1.3 - Surveying the Cyberspace

Quiz
•
Computers
•
University
•
Hard
Aviciena Santoso
Used 4+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
Man in the middle
Packet sniffing
Social engineering
Malware attacks
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker, pretending to be a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link.
Whaling
Fishing attack
Code injection
Phishing attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A common cyberattack where malicious software executes unauthorized actions on the victim’s system.
Code injection
Malware attacks
Lack of segregation
Default credentials
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This attack uses trial-and-error to guess login info, encryption keys, or to find a hidden web page.
Brute force attack
Trial and error attack
Password reuse attack
Encryption attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these vulnerabilities in a database happens when a user can access the information of another user with the same login credentials?
Default credentials
Unpatched database
Lack of authentication
Lack of segregation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following vulnerabilities in a database occurs when the developer does not configure a production database after creating it?
Default components and values
Default credentials
Failed configurations
Unpatched database
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users inundated with requirements to supply complex passwords to different systems often resort to reusing the same password across multiple accounts so that they can easily manage their credentials. This leads to which of the following vulnerabilities?
Faulty sessions
Identity theft
Credential reuse
Need a secretary to manage all my passwords
Create a free account and access millions of resources
Similar Resources on Wayground
19 questions
blockchain

Quiz
•
University
20 questions
Computer Knowledge

Quiz
•
12th Grade - University
20 questions
Web based attacks 2025

Quiz
•
University
10 questions
APi Security webinar

Quiz
•
University
10 questions
Cyber Security

Quiz
•
University
15 questions
Topic 4 - Understanding System Vulnerabilities

Quiz
•
12th Grade - University
20 questions
Buffer Overflows - CompTIA Security+ SY0-701 - 2.3

Quiz
•
9th Grade - University
10 questions
Unit 3 - 2.4.1 - Malware

Quiz
•
12th Grade - University
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
20 questions
Definite and Indefinite Articles in Spanish (Avancemos)

Quiz
•
8th Grade - University
7 questions
Force and Motion

Interactive video
•
4th Grade - University
36 questions
Unit 5 Key Terms

Quiz
•
11th Grade - University
7 questions
Figurative Language: Idioms, Similes, and Metaphors

Interactive video
•
4th Grade - University
15 questions
Properties of Equality

Quiz
•
8th Grade - University
38 questions
WH - Unit 3 Exam Review*

Quiz
•
10th Grade - University
21 questions
Advise vs. Advice

Quiz
•
6th Grade - University
12 questions
Reading a ruler!

Quiz
•
9th Grade - University