
Cybersecurity Threats and Protection Quiz
Authored by Ivan Dobrovan
Computers
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common method used in phishing attacks?
Impersonating trusted organizations
Using strong passwords
Installing antivirus software
Encrypting data
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware is designed to secretly gather information from a user's device?
Trojan
Virus
Spyware
Ransomware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does ransomware do to a victim's files?
Sends them to a remote server
Deletes them permanently
Encrypts them and demands a ransom
Corrupts them without notice
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack method involves trying every possible password combination?
Brute-Force
Phishing
DDoS
SQL Injection
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of phishing attacks?
To install malware
To steal sensitive information
To disrupt services
To create backdoors
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack is SQL Injection?
A method to steal passwords
A type of malware
A cyber attack on databases
A phishing technique
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common characteristic of a Trojan horse?
It is a type of virus
It encrypts files
It is disguised as a legitimate program
It replicates itself
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?