
Types of Cyberattacks Quiz
Authored by Shervon Yak
Computers
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is cryptojacking?
Unauthorized use of a victim's computing resources to mine cryptocurrency
Intercepting and eavesdropping on communication between two parties
Disrupting the normal functioning of a computer system, network, or website
Exploiting vulnerabilities in web applications
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do zero-day exploits target?
Software vulnerabilities that are unknown to the vendor or have not yet been patched
Impersonating legitimate entities to steal sensitive information
Unauthorized use of a victim's computing resources
Encrypting files or locking users out of their systems
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
Impersonating legitimate entities to trick users into revealing sensitive information
A type of malware
A type of denial of service attack
A type of web application vulnerability
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
Software designed to cause harm to a computer, server, or network
A type of social engineering attack
A type of software vulnerability
A type of hardware vulnerability
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do insider threats involve?
Malicious actions or security breaches perpetrated by individuals within an organization
Impersonating legitimate entities to trick users into revealing sensitive information
Disrupting the normal functioning of a computer system, network, or website
Exploiting vulnerabilities in web applications
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is ransomware?
Malware that encrypts files or locks users out of their systems until a ransom is paid
A type of social engineering attack
A type of denial of service attack
A type of web application vulnerability
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do XSS attacks involve?
Injecting malicious scripts into web pages viewed by other users
Launching coordinated attacks against a target
Exploiting unknown software vulnerabilities
Unauthorized use of a victim's computing resources
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?