prevalent types of cyber threats and their sources

prevalent types of cyber threats and their sources

Professional Development

10 Qs

quiz-placeholder

Similar activities

Hacker Academy Basic Training Quiz

Hacker Academy Basic Training Quiz

Professional Development

15 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

15 Qs

Cyber Security Quiz

Cyber Security Quiz

Professional Development

10 Qs

Office IT Management

Office IT Management

Professional Development

15 Qs

Identifying Malware

Identifying Malware

Professional Development

10 Qs

Windows Fundamentals Day 1 by Shreyas

Windows Fundamentals Day 1 by Shreyas

Professional Development

8 Qs

Cybersecurity

Cybersecurity

Professional Development

10 Qs

R&D Days

R&D Days

Professional Development

15 Qs

prevalent types of cyber threats and their sources

prevalent types of cyber threats and their sources

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Edmund Del Rosario

Used 4+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT a common source of cyber threats?

Malicious software (malware)

Weak passwords

System updates

Phishing emails

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

  • True or False: Social engineering attacks attempt to trick users into revealing personal information.

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cyber threat encrypts a user's files and demands a ransom payment to decrypt them?

Phishing

Malware

Ransomware

Spyware

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

a type of malware that downloads onto a computer disguised as a legitimate program.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: Computer threats are most likely to appear only in outdated software.

True

False

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

How do computer viruses spread. Select all possible answers.

online downloads

email attachments

external flash drive

Typing through key board

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Computer threats can be hidden in seemingly legitimate __________, such as email attachments or website downloads

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?