Cybersecurity Quiz - 2

Cybersecurity Quiz - 2

University

10 Qs

quiz-placeholder

Similar activities

Smart City Quiz

Smart City Quiz

University

10 Qs

Pubquiz 06.04.2020 Part III

Pubquiz 06.04.2020 Part III

9th Grade - University

10 Qs

Post Test Materi Routing Statis

Post Test Materi Routing Statis

University

10 Qs

Science Lab Safety Quiz

Science Lab Safety Quiz

6th Grade - University

10 Qs

Demenz

Demenz

University

7 Qs

Hacker quizz only hackers can know!!

Hacker quizz only hackers can know!!

4th Grade - Professional Development

8 Qs

Die Operation

Die Operation

KG - University

12 Qs

F&P Quizcogs: Innovate Q003

F&P Quizcogs: Innovate Q003

University

10 Qs

Cybersecurity Quiz - 2

Cybersecurity Quiz - 2

Assessment

Quiz

Science

University

Easy

Created by

Saray Kunly

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 20 pts

A nation-state conducts a cyber-espionage campaign to gather intelligence on a rival country's military capabilities. 

Black Hat Hacker

State-sponsored

Blue Hat Hacker

Script Kiddie

2.

MULTIPLE CHOICE QUESTION

10 sec • 20 pts

An individual discovers a software vulnerability, exploits it without permission, but reports the findings to the software company. 

Hacktivist

Black Hat Hacker

Grey Hat Hacker 

Script Kiddie

3.

MULTIPLE CHOICE QUESTION

10 sec • 20 pts

A child accidentally discovers how to bypass parental controls on a computer. 

Black Hat Hacker 

White Hat Hacker 

Script Kiddies 

Hacktivists 

4.

MULTIPLE CHOICE QUESTION

10 sec • 20 pts

XYZ Corporation's computers are infected with a program that displays misleading pop-up messages, tricking users into purchasing fake antivirus software. This is an example of:

Spyware

Scareware

Adware

Ransomware

5.

MULTIPLE CHOICE QUESTION

10 sec • 20 pts

A group of hackers conducts a cyber campaign with the goal of advancing a political or social cause. These individuals are best described as:

Green Hat Hackers

Black Hat Hackers

Hacktivists

Blue Hat Hackers

6.

MULTIPLE CHOICE QUESTION

10 sec • 20 pts

XYZ Corporation receives emails claiming to be from a reputable source, requesting sensitive financial information. These targeted and personalized attacks are characteristic of:

Phishing

Spear Phishing

DDOS

DOS

7.

MULTIPLE CHOICE QUESTION

10 sec • 20 pts

An individual gains unauthorized access to XYZ Corporation's servers and deletes critical databases, causing a significant loss of data. This is indicative of a:

Data destruction attack

Phishing

Ransomware

Adware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?