7in7 #01 Day-2

7in7 #01 Day-2

Professional Development

5 Qs

quiz-placeholder

Similar activities

Virus / malware

Virus / malware

Professional Development

9 Qs

General knowledge  quiz

General knowledge quiz

KG - Professional Development

10 Qs

Security Indicators of Attacks

Security Indicators of Attacks

Professional Development

10 Qs

System Ethical Hacking

System Ethical Hacking

Professional Development

10 Qs

Cybersecurity Pop Quiz

Cybersecurity Pop Quiz

Professional Development

7 Qs

Security Awareness Training

Security Awareness Training

Professional Development

10 Qs

SLOT 1: Foundation 1

SLOT 1: Foundation 1

Professional Development

10 Qs

Cybersecurity Threats Assessment

Cybersecurity Threats Assessment

Professional Development

10 Qs

7in7 #01 Day-2

7in7 #01 Day-2

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Yuktha Club

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the primary difference between active attacks and passive attacks in cybersecurity?

Active attacks involve physical intrusion, while passive attacks occur over the internet.

Active attacks only occur during the daytime, while passive attacks occur at night.

Active attacks directly impact the target, while passive attacks focus on eavesdropping.

Active attacks are always detected, while passive attacks go unnoticed.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which cyber attack involves tricking individuals into revealing sensitive information through psychological manipulation?

DDoS Attack

Phishing Attack

Malware Attack

SQL Injection Attack

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In the Colonial Pipeline Ransomware Attack, what was the consequence of the cyberattack?

Fuel shortages and price spikes

Water supply contamination

Internet service disruptions

Power grid failures

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What was the main objective of the WannaCry Ransomware attack?

Stealing credit card information

Accessing government secrets

Disrupting critical infrastructure

Encrypting files and demanding ransom

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which cyber attack targeted a major IT management software provider, compromising government agencies and corporations?

WannaCry Ransomware

Stuxnet Worm

NotPetya/ExPert Ransomware

SolarWinds Supply Chain Attack