Search Header Logo

Cybersecurity Threats and Protection Quiz

Authored by Ivan Dobrovan

Computers

Professional Development

Used 2+ times

Cybersecurity Threats and Protection Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method used in phishing attacks?

Impersonating trusted organizations

Using strong passwords

Installing antivirus software

Encrypting data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware is designed to secretly gather information from a user's device?

Trojan

Virus

Spyware

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ransomware do to a victim's files?

Sends them to a remote server

Deletes them permanently

Encrypts them and demands a ransom

Corrupts them without notice

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack method involves trying every possible password combination?

Brute-Force

Phishing

DDoS

SQL Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of phishing attacks?

To install malware

To steal sensitive information

To disrupt services

To create backdoors

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack is SQL Injection?

A method to steal passwords

A type of malware

A cyber attack on databases

A phishing technique

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common characteristic of a Trojan horse?

It is a type of virus

It encrypts files

It is disguised as a legitimate program

It replicates itself

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?