Foundations of Cyber Security: Quiz 3

Foundations of Cyber Security: Quiz 3

Professional Development

20 Qs

quiz-placeholder

Similar activities

Introduction to Cybersecurity + linux

Introduction to Cybersecurity + linux

Professional Development

16 Qs

MS900 - Module 4 - Full Quiz

MS900 - Module 4 - Full Quiz

Professional Development

15 Qs

Security

Security

Professional Development

20 Qs

Application/Service Attacks

Application/Service Attacks

KG - Professional Development

18 Qs

AI Cybersecurity Quiz

AI Cybersecurity Quiz

Professional Development

15 Qs

Teachers and Cybersecurity

Teachers and Cybersecurity

Professional Development

15 Qs

Malware

Malware

Professional Development

15 Qs

Cyber Resilience Training

Cyber Resilience Training

Professional Development

16 Qs

Foundations of Cyber Security: Quiz 3

Foundations of Cyber Security: Quiz 3

Assessment

Quiz

Computers

Professional Development

Easy

Created by

John Coder

Used 7+ times

FREE Resource

20 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

p_____________ is the use of digital communications to trick people into revealing sensitive data or deploying malicious software. 

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.

BEC

Spear phishing

Whaling

Vishing

Smishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.

BEC

Spear phishing

Whaling

Vishing

Smishing

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.

BEC

Spear phishing

Whaling

Vishing

Smishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Threat actors target company executives to gain access to sensitive data.

BEC

Spear phishing

Whaling

Vishing

Smishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source

BEC

Spear phishing

Whaling

Vishing

Smishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

BEC

A threat actor sends an email message that seems to be from a known source to make a seemingly legitimate request for information, in order to obtain a financial advantage.

A malicious email attack that targets a specific user or group of users. The email seems to originate from a trusted source.

A form of spear phishing. Threat actors target company executives to gain access to sensitive data.

The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source.

The use of text messages to trick users, in order to obtain sensitive information or to impersonate a known source.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?