L7: Cybersecurity Threats Quiz

L7: Cybersecurity Threats Quiz

University

15 Qs

quiz-placeholder

Similar activities

DoS Attack Quiz

DoS Attack Quiz

University

10 Qs

Test sulla Sicurezza Informatica

Test sulla Sicurezza Informatica

11th Grade - University

10 Qs

Surprise Test_Phishing

Surprise Test_Phishing

University

15 Qs

CSF Week 2

CSF Week 2

University

10 Qs

Cyber Security Threats/Attacks Quiz

Cyber Security Threats/Attacks Quiz

University

10 Qs

cyber awareness

cyber awareness

University

20 Qs

GenCyber

GenCyber

11th Grade - University

10 Qs

CyberSafety Pre-Assessment

CyberSafety Pre-Assessment

KG - University

16 Qs

L7: Cybersecurity Threats Quiz

L7: Cybersecurity Threats Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Jerry Jackson Bent

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a threat, vulnerability, and attack?

C. A threat is a deliberate act, a vulnerability is a possibility of an attack, and an attack is a weakness

B. A threat is a weakness, a vulnerability is a possibility of an attack, and an attack is a deliberate act

D. A threat is a weakness, a vulnerability is a deliberate act, and an attack is a possibility of an attack

A. A threat is a possibility of an attack, a vulnerability is a weakness, and an attack is a deliberate act

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A. Software designed to enhance system performance

D. Software designed to enhance network speed

C. Software designed to improve network security

B. Software designed to interfere with system operation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware can replicate independently and exploit vulnerabilities in networks?

D. Ransomware

C. Trojan horse

B. Worm

A. Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between a virus, worm, and trojan horse?

C. Viruses need human intervention, worms need human intervention, trojan horse can replicate independently

B. Viruses can replicate independently, worms need human intervention, trojan horse does not need to be attached to an executable file

D. Viruses can replicate independently, worms can replicate independently, trojan horse needs human intervention

A. Viruses need human intervention, worms can replicate independently, trojan horse does not need to be attached to an executable file

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware uses encryptions with unknown keys and locks down systems until a ransom is paid?

D. Ransomware

B. Worm

A. Virus

C. Trojan horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware can activate malicious code through triggers such as certain dates or times?

D. Spyware

A. Logic Bomb

C. Rootkit

B. Backdoor

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a backdoor malware?

B. To gain remote access to the computer

D. All of the above

A. To exploit the operating system's vulnerability

C. To modify access levels and system files

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?