Cybersecurity Threats Quiz

Cybersecurity Threats Quiz

Professional Development

98 Qs

quiz-placeholder

Similar activities

DAY I--ALE JAN 2022

DAY I--ALE JAN 2022

Professional Development

100 Qs

Tebak youtuber Minecraft

Tebak youtuber Minecraft

KG - Professional Development

99 Qs

Hamilton College Family Quiz 2

Hamilton College Family Quiz 2

KG - Professional Development

100 Qs

GOKULAM  (QUIZZ 8)

GOKULAM (QUIZZ 8)

Professional Development

100 Qs

1ST IFRC 2023

1ST IFRC 2023

Professional Development

100 Qs

Kewirausahaan Dasar

Kewirausahaan Dasar

11th Grade - Professional Development

100 Qs

Pretest menuju guru yang profesional

Pretest menuju guru yang profesional

Professional Development

100 Qs

Product Training Forklift

Product Training Forklift

Professional Development

100 Qs

Cybersecurity Threats Quiz

Cybersecurity Threats Quiz

Assessment

Quiz

Other

Professional Development

Easy

Created by

Kyle Concevido

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

98 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hospital employee receives an email claiming to be from IT, asking them to verify login credentials through a link. What kind of threat does this represent?

System configuration error

Credential stuffing

Phishing attack

Firewall misconfiguration

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cyber audit, a company finds that many employees use the same password across systems. What vulnerability does this highlight?

Cross-platform integration

Human error

Encryption protocol weakness

Database overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user downloads a free mobile app that silently records keystrokes. What type of malware is this?

Rootkit

Adware

Keylogger

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After opening a suspicious attachment, an employee finds all files on their PC encrypted, with a ransom note demanding cryptocurrency. What is this attack known as?

Phishing

Trojan

Ransomware

Data interception

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A government database is breached through an outdated system that had not been patched in years. What was the most likely root cause?

Insider sabotage

Misconfigured DNS

Unpatched vulnerability

Power outage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybercriminal intercepts data sent between two parties without them noticing. What type of attack is this?

Replay attack

DDoS

MITM (Man-in-the-Middle)

Brute-force attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A disgruntled ex-employee remotely accesses internal systems using valid credentials that were never revoked. Which threat category does this fall under?

Script kiddie

Insider threat

Social engineering

Physical intrusion

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?