Attacks

Attacks

University

10 Qs

quiz-placeholder

Similar activities

Recognizing Red Flags in Phishing Emails

Recognizing Red Flags in Phishing Emails

University

10 Qs

SOF102 Topic 5

SOF102 Topic 5

University

10 Qs

Information Security Quiz

Information Security Quiz

University

11 Qs

Wireless and Mobile Networks - Session 15 - 16

Wireless and Mobile Networks - Session 15 - 16

University

10 Qs

ITEC 70 - Quiz # 2

ITEC 70 - Quiz # 2

University

15 Qs

Understanding Active and Passive Listening

Understanding Active and Passive Listening

University

10 Qs

Technology in Educational Assessments

Technology in Educational Assessments

9th Grade - University

6 Qs

CyberSecurity Midterm Long Test

CyberSecurity Midterm Long Test

University

14 Qs

Attacks

Attacks

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Usman Ali

Used 3+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

An attacker gains access to a corporate network and, over several weeks, copies large amounts of research data. They are careful not to delete or modify any files, and they cover their tracks so system administrators don't notice any disruption.

Active and Unintentional

Passive and Unintentional

Active and Intentional

Passive and Intentional

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A cybercriminal group wants to disrupt the operations of a major national bank. They know the bank has strong defenses, so they launch a massive Distributed Denial of Service (DDoS) attack against the bank's internet service provider (ISP), causing outages for the bank and all other customers of that ISP.

From the bank's perspective, which term best describes this attack strategy?

Direct attack

An Indirect attack

A Passive attack

An Unintentional attack

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A rival company wants to take down a competitor's online store during a holiday sale. They execute a ransomware attack that encrypts all of the store's website files, replacing the homepage with a ransom note. This makes the site completely unusable.

Based on its effect on the online store's operations, this attack is best described as:

Passive

Indirect

Active

Unintentional

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

An office manager is responsible for decommissioning old computers. Following company policy, they attempt to wipe the hard drives before sending them to a recycler. However, the software they use fails silently, leaving all the sensitive company data intact on the drives.

Which term best classifies the manager's action that led to this potential data breach?

Intentional

Passive

Indirect

Unintentional

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A hacker sits in a coffee shop and uses sniffing software to monitor all the unencrypted Wi-Fi traffic. They are able to capture login credentials and personal messages from other customers without interfering with anyone's connection.

The hacker's monitoring of traffic, without altering it, is an example of what kind of attack?

An Active attack

A Passive attack

A Physical attack

An Unintentional attack

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A disgruntled employee plans to steal their company's confidential client list before they quit. On their last day, they log into the company's CRM system, download the client list to a USB drive, and delete the original files from the server to cause chaos.

How is this incident best classified in terms of action and intent?

Passive and Intentional

Active and Unintentional

Active and Intentional

Passive and Unintentional

7.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

A user receives an email that appears to be from their bank, asking them to verify their account details due to a "security update." The user clicks the link, enters their username and password on a fake website, and the attacker immediately uses these credentials to access their real bank account.

How is this phishing attack best classified?

Indirect and Unintentional

Direct and Unintentional

Passive and Intentional

Direct and Intentional

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?