Cybersecurity Awareness

Cybersecurity Awareness

University

10 Qs

quiz-placeholder

Similar activities

Amenazas de Seguridad

Amenazas de Seguridad

University

11 Qs

Denial of Service Attacks

Denial of Service Attacks

University

10 Qs

Cyber Security

Cyber Security

University

10 Qs

FCS Quiz-1

FCS Quiz-1

University

12 Qs

S3 Computing Security Quiz

S3 Computing Security Quiz

KG - University

10 Qs

cybersecurity

cybersecurity

University

10 Qs

Quiz for computer virus-Teacher Mae

Quiz for computer virus-Teacher Mae

University

13 Qs

Identifying Security Threats and Vulnerabilities

Identifying Security Threats and Vulnerabilities

University

10 Qs

Cybersecurity Awareness

Cybersecurity Awareness

Assessment

Quiz

Computers

University

Medium

Created by

Masood Aslam

Used 2+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What type of cyber attack involves sending fraudulent emails to trick individuals into revealing personal information?

Ransomware

Malware

Spoofing

Phishing

2.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Which type of ransomware encrypts files on a victim's computer and demands payment for decryption?

File-locking ransomware

Decryption ransomware

Data-stealing ransomware

Encrypting ransomware

3.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What method is commonly used in DDoS attacks to overwhelm a target system with a flood of traffic?

Bandwidth throttling

Traffic flooding

Packet filtering

Firewall configuration

4.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Which variant of malware disguises itself as legitimate software to infect a system?

Trojan horse

Ransomware

Worm

Spyware

5.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What social engineering technique involves manipulating individuals into divulging confidential information?

Spoofing

Vishing

Smishing

Phishing

6.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

In what type of attack does an attacker insert malicious code into a database query to gain unauthorized access?

Cross-Site Scripting

SQL Injection

Malware Injection

Phishing Attack

7.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What cyber attack involves sending malicious links via email or messages to steal sensitive information?

Spyware

Ransomware

Phishing

Trojan Horse

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?