Non-fraudulent vs. Fraudulent Threats ( GROUP 6 )

Non-fraudulent vs. Fraudulent Threats ( GROUP 6 )

University

15 Qs

quiz-placeholder

Similar activities

M2_W2_Cloud_Computing

M2_W2_Cloud_Computing

University

15 Qs

Quiz FinTech 10

Quiz FinTech 10

University

10 Qs

облачные технологии-1

облачные технологии-1

University

15 Qs

CySA+ Days 4-5

CySA+ Days 4-5

University

14 Qs

Decode the Tech Emoji

Decode the Tech Emoji

University

20 Qs

Informatik und Trends Quiz XIII

Informatik und Trends Quiz XIII

University

20 Qs

Internet of Things, Big Data, Cloud Computing

Internet of Things, Big Data, Cloud Computing

University

10 Qs

Materi PPLG Bab ! dan 2

Materi PPLG Bab ! dan 2

4th Grade - University

10 Qs

Non-fraudulent vs. Fraudulent Threats ( GROUP 6 )

Non-fraudulent vs. Fraudulent Threats ( GROUP 6 )

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Mark Feguro

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary origin of non-fraudulent threats?

Phishing attempts via SMS

Malware-laden applications

Deliberate attacks for financial gain

Mistakes or technical shortcomings

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a fraudulent threat in IoT?

Using factory default passwords because the user didn't change them

Lack of firmware updates due to device limitations

Botnet formation using default credentials to launch DDoS attacks

Using unencrypted communication protocols like Telnet

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the presentation, why are IoT and mobile devices particularly vulnerable?

They have high computing power that attracts attackers.

They often struggle to support strong authentication and encryption

They are not multiplying rapidly.

They do not process sensitive personal data.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "Smishing" refer to?

Disguised apps that inject malware

Spyware that captures user activity

Phishing via SMS to trick users into revealing credentials

Hijacking devices to demand a ransom

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a non-fraudulent threat for mobile devices?

Spyware and keyloggers

Excessive app permissions leading to unintentional data leakage

Malicious APKs

Vishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key reason for the expanding cyber-attack surface?

A decline in data sensitivity.

The decrease in the number of smart appliances.

The use of strong encryption on all devices.

The rapid multiplication of IoT and mobile endpoints

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Mirai and Mozi botnets are examples of what kind of threat?

Non-fraudulent IoT threats

Fraudulent mobile threats

Non-fraudulent mobile threats

Fraudulent IoT threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?