
Computer Attacks and Threats

Quiz
•
Computers
•
University
•
Medium
Dorcah Nyakeriga
Used 2+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a phishing attack?
A phishing attack is a type of fishing competition where participants catch as many fish as possible in a given time frame.
A phishing attack is a type of gardening technique used to grow vegetables in a small space.
A phishing attack is a type of physical exercise involving stretching and flexibility.
A phishing attack is a type of cyber attack where attackers send fraudulent emails or messages pretending to be from reputable companies or individuals in order to steal sensitive information such as login credentials or financial details.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Explain the difference between a virus and a worm.
A virus can only infect executable files, while a worm can infect any type of file
A virus spreads through email attachments, while a worm spreads through network vulnerabilities
A virus needs a host program, whereas a worm is standalone.
A virus and a worm are both types of malware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a DDoS attack and how does it work?
A DDoS attack works by sending friendly messages to the target to help it improve its performance.
A DDoS attack works by asking the target politely to slow down its operations.
A DDoS attack works by sending a single source of traffic to overwhelm the target.
A DDoS attack works by flooding the target with an overwhelming amount of traffic from multiple sources, causing it to become slow or unresponsive.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Describe the concept of ransomware.
Ransomware is a type of hardware used to enhance computer performance.
Ransomware is a type of malicious software that encrypts files on a victim's computer and demands payment for decryption.
Ransomware is a type of antivirus software that protects computers from malware.
Ransomware is a form of cloud storage used to back up files securely.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is social engineering in the context of cyber attacks?
Social engineering is a tactic used by cyber attackers to exploit human psychology rather than technical vulnerabilities.
Social engineering is a type of software used to protect against cyber attacks.
Social engineering is a method of encrypting data to prevent unauthorized access.
Social engineering involves physically breaking into a building to access computer systems.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can a Trojan horse infect a computer?
By physically connecting to the computer with a USB drive
By sending spam emails with malicious attachments
By exploiting vulnerabilities in the computer's operating system
By disguising itself as a harmless file or program and tricking the user into downloading and executing it.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a man-in-the-middle attack?
To enhance security measures
To establish a secure connection
To prevent data breaches
To intercept communication between two parties
Create a free account and access millions of resources
Similar Resources on Wayground
9 questions
Ict/cyberterrorism

Quiz
•
KG - Professional Dev...
10 questions
Lesson 2 - Passing Data to Subsystems

Quiz
•
University
10 questions
Digital Technology Careers Quiz

Quiz
•
10th Grade - University
13 questions
Pet simulator x Test

Quiz
•
1st Grade - Professio...
8 questions
Network Security Fundamentals

Quiz
•
University
10 questions
Cycle 3 - Vocabulary review - Units 1-2

Quiz
•
University
10 questions
Networking Essentials

Quiz
•
University
10 questions
Physical Security

Quiz
•
1st Grade - University
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Computers
20 questions
Disney Characters

Quiz
•
KG
11 questions
NFL Football logos

Quiz
•
KG - Professional Dev...
20 questions
Place Value

Quiz
•
KG - 3rd Grade
10 questions
Movie Trivia

Quiz
•
KG - 2nd Grade
20 questions
Logos

Quiz
•
KG
6 questions
Things that can move.

Quiz
•
KG
15 questions
Pronouns

Quiz
•
KG - 3rd Grade
15 questions
The Five Senses

Quiz
•
KG