The use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes.
1.3 - Surveying the Cyberspace

Quiz
•
Computers
•
University
•
Hard
Aviciena Santoso
Used 4+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Man in the middle
Packet sniffing
Social engineering
Malware attacks
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An attacker, pretending to be a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link.
Whaling
Fishing attack
Code injection
Phishing attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A common cyberattack where malicious software executes unauthorized actions on the victim’s system.
Code injection
Malware attacks
Lack of segregation
Default credentials
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This attack uses trial-and-error to guess login info, encryption keys, or to find a hidden web page.
Brute force attack
Trial and error attack
Password reuse attack
Encryption attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these vulnerabilities in a database happens when a user can access the information of another user with the same login credentials?
Default credentials
Unpatched database
Lack of authentication
Lack of segregation
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following vulnerabilities in a database occurs when the developer does not configure a production database after creating it?
Default components and values
Default credentials
Failed configurations
Unpatched database
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users inundated with requirements to supply complex passwords to different systems often resort to reusing the same password across multiple accounts so that they can easily manage their credentials. This leads to which of the following vulnerabilities?
Faulty sessions
Identity theft
Credential reuse
Need a secretary to manage all my passwords
Create a free account and access millions of resources
Similar Resources on Quizizz
16 questions
File System & Security, Unix

Quiz
•
University
10 questions
CHAPTER 1 : Introduction to Network Security

Quiz
•
University
20 questions
NETWORK SECURITY

Quiz
•
University
11 questions
Re-Quiz : Developing Your Security Policy (Chapter 2)

Quiz
•
University
15 questions
7.7 Software Security Review

Quiz
•
8th Grade - University
10 questions
CN3303 Lecture 3 Business Risk and Continuity

Quiz
•
University
10 questions
Week 10 - Cyber Attacks Quiz - Exercise 1

Quiz
•
University
18 questions
Cybersecurity Quiz

Quiz
•
University
Popular Resources on Quizizz
25 questions
Equations of Circles

Quiz
•
10th - 11th Grade
30 questions
Week 5 Memory Builder 1 (Multiplication and Division Facts)

Quiz
•
9th Grade
33 questions
Unit 3 Summative - Summer School: Immune System

Quiz
•
10th Grade
10 questions
Writing and Identifying Ratios Practice

Quiz
•
5th - 6th Grade
36 questions
Prime and Composite Numbers

Quiz
•
5th Grade
14 questions
Exterior and Interior angles of Polygons

Quiz
•
8th Grade
37 questions
Camp Re-cap Week 1 (no regression)

Quiz
•
9th - 12th Grade
46 questions
Biology Semester 1 Review

Quiz
•
10th Grade