Computer Attacks and Threats

Computer Attacks and Threats

University

10 Qs

quiz-placeholder

Similar activities

19EC2031 - QA2

19EC2031 - QA2

University

10 Qs

Cyber Attribution Quiz

Cyber Attribution Quiz

University

10 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Activity 1 - IAS 101

Activity 1 - IAS 101

University

12 Qs

Network Forensics and Log Capturing

Network Forensics and Log Capturing

University

15 Qs

Information Assurance Final Quiz

Information Assurance Final Quiz

University

15 Qs

Phishing Quiz

Phishing Quiz

University

10 Qs

Cyber Forensics Quiz 20

Cyber Forensics Quiz 20

University

12 Qs

Computer Attacks and Threats

Computer Attacks and Threats

Assessment

Quiz

Computers

University

Medium

Created by

Dorcah Nyakeriga

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a phishing attack?

A phishing attack is a type of fishing competition where participants catch as many fish as possible in a given time frame.

A phishing attack is a type of gardening technique used to grow vegetables in a small space.

A phishing attack is a type of physical exercise involving stretching and flexibility.

A phishing attack is a type of cyber attack where attackers send fraudulent emails or messages pretending to be from reputable companies or individuals in order to steal sensitive information such as login credentials or financial details.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the difference between a virus and a worm.

A virus can only infect executable files, while a worm can infect any type of file

A virus spreads through email attachments, while a worm spreads through network vulnerabilities

A virus needs a host program, whereas a worm is standalone.

A virus and a worm are both types of malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS attack and how does it work?

A DDoS attack works by sending friendly messages to the target to help it improve its performance.

A DDoS attack works by asking the target politely to slow down its operations.

A DDoS attack works by sending a single source of traffic to overwhelm the target.

A DDoS attack works by flooding the target with an overwhelming amount of traffic from multiple sources, causing it to become slow or unresponsive.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe the concept of ransomware.

Ransomware is a type of hardware used to enhance computer performance.

Ransomware is a type of malicious software that encrypts files on a victim's computer and demands payment for decryption.

Ransomware is a type of antivirus software that protects computers from malware.

Ransomware is a form of cloud storage used to back up files securely.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering in the context of cyber attacks?

Social engineering is a tactic used by cyber attackers to exploit human psychology rather than technical vulnerabilities.

Social engineering is a type of software used to protect against cyber attacks.

Social engineering is a method of encrypting data to prevent unauthorized access.

Social engineering involves physically breaking into a building to access computer systems.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a Trojan horse infect a computer?

By physically connecting to the computer with a USB drive

By sending spam emails with malicious attachments

By exploiting vulnerabilities in the computer's operating system

By disguising itself as a harmless file or program and tricking the user into downloading and executing it.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a man-in-the-middle attack?

To enhance security measures

To establish a secure connection

To prevent data breaches

To intercept communication between two parties

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?