Computer Attacks and Threats

Computer Attacks and Threats

University

10 Qs

quiz-placeholder

Similar activities

SAN Module 4 Quiz

SAN Module 4 Quiz

University

15 Qs

WN-CELLULAR CONCEPT

WN-CELLULAR CONCEPT

University

10 Qs

Validación de documentos

Validación de documentos

University

14 Qs

Què en saps de GSuite?

Què en saps de GSuite?

University - Professional Development

10 Qs

Soal SKD

Soal SKD

University - Professional Development

10 Qs

Week 4

Week 4

University

15 Qs

4.6.4 Logic Gates

4.6.4 Logic Gates

10th Grade - Professional Development

15 Qs

Software Engineering :TEST 2

Software Engineering :TEST 2

University

10 Qs

Computer Attacks and Threats

Computer Attacks and Threats

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Dorcah Nyakeriga

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a phishing attack?

A phishing attack is a type of fishing competition where participants catch as many fish as possible in a given time frame.

A phishing attack is a type of gardening technique used to grow vegetables in a small space.

A phishing attack is a type of physical exercise involving stretching and flexibility.

A phishing attack is a type of cyber attack where attackers send fraudulent emails or messages pretending to be from reputable companies or individuals in order to steal sensitive information such as login credentials or financial details.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the difference between a virus and a worm.

A virus can only infect executable files, while a worm can infect any type of file

A virus spreads through email attachments, while a worm spreads through network vulnerabilities

A virus needs a host program, whereas a worm is standalone.

A virus and a worm are both types of malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS attack and how does it work?

A DDoS attack works by sending friendly messages to the target to help it improve its performance.

A DDoS attack works by asking the target politely to slow down its operations.

A DDoS attack works by sending a single source of traffic to overwhelm the target.

A DDoS attack works by flooding the target with an overwhelming amount of traffic from multiple sources, causing it to become slow or unresponsive.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe the concept of ransomware.

Ransomware is a type of hardware used to enhance computer performance.

Ransomware is a type of malicious software that encrypts files on a victim's computer and demands payment for decryption.

Ransomware is a type of antivirus software that protects computers from malware.

Ransomware is a form of cloud storage used to back up files securely.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering in the context of cyber attacks?

Social engineering is a tactic used by cyber attackers to exploit human psychology rather than technical vulnerabilities.

Social engineering is a type of software used to protect against cyber attacks.

Social engineering is a method of encrypting data to prevent unauthorized access.

Social engineering involves physically breaking into a building to access computer systems.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a Trojan horse infect a computer?

By physically connecting to the computer with a USB drive

By sending spam emails with malicious attachments

By exploiting vulnerabilities in the computer's operating system

By disguising itself as a harmless file or program and tricking the user into downloading and executing it.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a man-in-the-middle attack?

To enhance security measures

To establish a secure connection

To prevent data breaches

To intercept communication between two parties

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?