Cybersecurity and Technological Changes Quiz

Cybersecurity and Technological Changes Quiz

University

10 Qs

quiz-placeholder

Similar activities

Ethical Hacking - Quiz

Ethical Hacking - Quiz

University

15 Qs

Windows 10 review (standard)

Windows 10 review (standard)

KG - University

9 Qs

Average level

Average level

University

15 Qs

Desafíos de la Guerra Cibernética

Desafíos de la Guerra Cibernética

University

15 Qs

INFOASSURANCE

INFOASSURANCE

University

10 Qs

Gaming

Gaming

8th Grade - Professional Development

7 Qs

Computer Security Day Nov 30

Computer Security Day Nov 30

University

10 Qs

Lesson 5 - Internet Threats

Lesson 5 - Internet Threats

University

15 Qs

Cybersecurity and Technological Changes Quiz

Cybersecurity and Technological Changes Quiz

Assessment

Quiz

Computers

University

Hard

Created by

Gatot Soepriyanto

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the areas that have yielded a disproportionate impact on cybersecurity?

Artificial intelligence, Virtual reality, Augmented reality, Blockchain

Digital data, The Internet, Cryptocurrency, Mobile workforces and ubiquitous access

Social media, Online shopping, Video streaming, Online gaming

Cloud computing, Internet of Things, 5G technology, Quantum computing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves flooding a computer or computer network with large amounts of requests or data to make it incapable of responding properly to legitimate requests?

Phishing attacks

Man-in-the-middle attacks

Ransomware attacks

Denial-of-service (DoS) attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for malware that demands a ransom be paid to a criminal in exchange for the infected party not suffering some harm?

Ransomware

Trojans

Worms

Viruses

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of phishing attack is designed and sent to target a specific person, business, or organization?

Whaling

Vishing

Spear phishing

Pharming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for software that surreptitiously collects information from a device without permission?

Spyware

Adware

Cryptocurrency miners

Scareware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware exploits a vulnerability not previously known to the public or to the vendor of the technology containing the vulnerability?

Cryptocurrency miners

Blended malware

Fake malware

Zero-day malware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which group of attackers seek to benefit themselves at the expense of others and include script kiddies, terrorists, and rogue groups?

Black hat hackers

White hat hackers

Green hat hackers

Gray hat hackers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?