Understanding Cyber Attacks

Understanding Cyber Attacks

University

10 Qs

quiz-placeholder

Similar activities

Cyber Security 101

Cyber Security 101

University

10 Qs

Principios de seguridad en los requerimientos

Principios de seguridad en los requerimientos

University

14 Qs

CyberTechDay

CyberTechDay

University

8 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

Cyber Hygiene

Cyber Hygiene

University

15 Qs

Fuel User Group Member Quiz

Fuel User Group Member Quiz

University

10 Qs

IntroAnalisisMalware

IntroAnalisisMalware

University

10 Qs

Cybersecurity Basics Quiz

Cybersecurity Basics Quiz

6th Grade - University

15 Qs

Understanding Cyber Attacks

Understanding Cyber Attacks

Assessment

Quiz

Other

University

Medium

Created by

กฤตศิลป์ ศิลานนท์

Used 7+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a cyber attack?

A cyber attack is a legal action taken against hackers.

A cyber attack is a method to enhance computer security.

A cyber attack is a routine maintenance procedure for networks.

A cyber attack is a malicious attempt to damage or disrupt computer systems or networks.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing in the context of cyber security?

Phishing is a method of improving email communication efficiency.

Phishing is a method of attempting to acquire sensitive information by masquerading as a trustworthy entity in electronic communications.

Phishing refers to the process of encrypting sensitive data.

Phishing is a technique used to enhance online security.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can ransomware affect individuals and organizations?

Ransomware is a tool used for data recovery and backup.

Ransomware affects individuals and organizations by encrypting data, causing operational disruption, financial loss, and potential reputational damage.

Ransomware only affects government agencies and not private individuals.

Ransomware improves data security for individuals and organizations.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. A ___________ is a small malicious program that runs hidden on infected system.

Virus

Trojan

Shareware

Adware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a DDoS attack?

To gather sensitive information from the targeted service.

To test the security measures of a targeted service without causing harm.

To enhance the performance of a targeted service by increasing traffic.

To disrupt the normal functioning of a targeted service by overwhelming it with traffic.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'malware' refer to?

Malware refers to malicious software designed to harm or exploit computer systems.

Malware is a term for software that protects against viruses.

Malware refers to software that enhances computer performance.

Malware is a type of hardware used in computers.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. ________________ are unnecessary software which infiltrates user’s system, observe on user’s activities, stealing internet usage data & sensitive information of that user.

Shareware

Spyware

Ransomware

Freeware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?