Search Header Logo

Cybersecurity and Technological Changes Quiz

Authored by Gatot Soepriyanto

Computers

University

Cybersecurity and Technological Changes Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are the areas that have yielded a disproportionate impact on cybersecurity?

Artificial intelligence, Virtual reality, Augmented reality, Blockchain

Digital data, The Internet, Cryptocurrency, Mobile workforces and ubiquitous access

Social media, Online shopping, Video streaming, Online gaming

Cloud computing, Internet of Things, 5G technology, Quantum computing

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves flooding a computer or computer network with large amounts of requests or data to make it incapable of responding properly to legitimate requests?

Phishing attacks

Man-in-the-middle attacks

Ransomware attacks

Denial-of-service (DoS) attacks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for malware that demands a ransom be paid to a criminal in exchange for the infected party not suffering some harm?

Ransomware

Trojans

Worms

Viruses

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of phishing attack is designed and sent to target a specific person, business, or organization?

Whaling

Vishing

Spear phishing

Pharming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the term for software that surreptitiously collects information from a device without permission?

Spyware

Adware

Cryptocurrency miners

Scareware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware exploits a vulnerability not previously known to the public or to the vendor of the technology containing the vulnerability?

Cryptocurrency miners

Blended malware

Fake malware

Zero-day malware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which group of attackers seek to benefit themselves at the expense of others and include script kiddies, terrorists, and rogue groups?

Black hat hackers

White hat hackers

Green hat hackers

Gray hat hackers

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?