
Types of Cyberattacks Quiz

Quiz
•
Computers
•
12th Grade
•
Easy
Shervon Yak
Used 1+ times
FREE Resource
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is cryptojacking?
Unauthorized use of a victim's computing resources to mine cryptocurrency
Intercepting and eavesdropping on communication between two parties
Disrupting the normal functioning of a computer system, network, or website
Exploiting vulnerabilities in web applications
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do zero-day exploits target?
Software vulnerabilities that are unknown to the vendor or have not yet been patched
Impersonating legitimate entities to steal sensitive information
Unauthorized use of a victim's computing resources
Encrypting files or locking users out of their systems
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
Impersonating legitimate entities to trick users into revealing sensitive information
A type of malware
A type of denial of service attack
A type of web application vulnerability
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
Software designed to cause harm to a computer, server, or network
A type of social engineering attack
A type of software vulnerability
A type of hardware vulnerability
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do insider threats involve?
Malicious actions or security breaches perpetrated by individuals within an organization
Impersonating legitimate entities to trick users into revealing sensitive information
Disrupting the normal functioning of a computer system, network, or website
Exploiting vulnerabilities in web applications
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is ransomware?
Malware that encrypts files or locks users out of their systems until a ransom is paid
A type of social engineering attack
A type of denial of service attack
A type of web application vulnerability
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do XSS attacks involve?
Injecting malicious scripts into web pages viewed by other users
Launching coordinated attacks against a target
Exploiting unknown software vulnerabilities
Unauthorized use of a victim's computing resources
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Software Quiz

Quiz
•
9th - 12th Grade
15 questions
Computer Apps 2 Exam Review

Quiz
•
9th - 12th Grade
15 questions
BTEC L2 Unit 1 Online World 1-8

Quiz
•
11th - 12th Grade
10 questions
Technical Terms - Internet (A-Z) - Hypertext

Quiz
•
12th Grade
14 questions
CompTIA Security+ Practice Test 2

Quiz
•
12th Grade
12 questions
Microsoft Programs

Quiz
•
9th - 12th Grade
15 questions
6th Grade Media Quiz

Quiz
•
KG - University
15 questions
Introduction to CSS

Quiz
•
11th - 12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
15 questions
Core 4 of Customer Service - Student Edition

Quiz
•
6th - 8th Grade
15 questions
What is Bullying?- Bullying Lesson Series 6-12

Lesson
•
11th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade