Lesson 02: Understanding Cyber Security Threats

Lesson 02: Understanding Cyber Security Threats

University

25 Qs

quiz-placeholder

Similar activities

Information Security Quiz

Information Security Quiz

University

25 Qs

Jenis dan Dampak Malware Informatika Kelas 9

Jenis dan Dampak Malware Informatika Kelas 9

9th Grade - University

20 Qs

Quiz Keamanan Data dan Informasi

Quiz Keamanan Data dan Informasi

9th Grade - University

20 Qs

Quiz on Malware and Cyber Security

Quiz on Malware and Cyber Security

University

20 Qs

Security Fundamental

Security Fundamental

University

20 Qs

Q5. Ethical Issues in information technology

Q5. Ethical Issues in information technology

University

20 Qs

Chapter 4: Computer Networking Quiz

Chapter 4: Computer Networking Quiz

University

20 Qs

sistemas operativos

sistemas operativos

8th Grade - University

30 Qs

Lesson 02: Understanding Cyber Security Threats

Lesson 02: Understanding Cyber Security Threats

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

EDWIN GARCIA

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware is designed to encrypt files and demand payment for decryption?

trojan horse

ransomware

adware

spyware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common social engineering technique?

Vishing

Spoofing

Shoulder Surfing

Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a Denial of Service (DoS) attack aim to achieve?

To provide additional resources to a service.

To disrupt the normal functioning of a targeted system or service.

To steal sensitive information from a user.

To enhance the performance of a targeted system.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a Man-in-the-Middle (MITM) attack, what is the attacker trying to do?

The attacker is trying to establish a secure connection between two parties.

The attacker is trying to steal the identity of one of the parties.

The attacker is trying to intercept and manipulate communication between two parties.

The attacker is trying to enhance the communication speed between two parties.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is often disguised as legitimate software?

Trojan horse

Ransomware

Virus

Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of ransomware?

To extort money from victims.

To protect data from unauthorized access.

To improve system performance.

To delete files permanently.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware?

Trojan

Firewall

Spyware

Antivirus

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?