Lesson 02: Understanding Cyber Security Threats

Lesson 02: Understanding Cyber Security Threats

University

25 Qs

quiz-placeholder

Similar activities

Mesin Pencari Artikel

Mesin Pencari Artikel

11th Grade - University

20 Qs

DATA STRUCTUIR Quiz1 (AIML)

DATA STRUCTUIR Quiz1 (AIML)

University

20 Qs

GDG ANDROID BOOTCAMP QUIZ

GDG ANDROID BOOTCAMP QUIZ

University

20 Qs

Linux - podstawy + polecenia konsoli

Linux - podstawy + polecenia konsoli

10th Grade - University

20 Qs

Fuzzy Inference System

Fuzzy Inference System

University

20 Qs

GRADE 4| 2ND QUARTER

GRADE 4| 2ND QUARTER

University

20 Qs

Skills of an Administrator Assessment

Skills of an Administrator Assessment

12th Grade - University

20 Qs

TOPIC 4: Designing Mobile Application Interface

TOPIC 4: Designing Mobile Application Interface

University

20 Qs

Lesson 02: Understanding Cyber Security Threats

Lesson 02: Understanding Cyber Security Threats

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

EDWIN GARCIA

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware is designed to encrypt files and demand payment for decryption?

trojan horse

ransomware

adware

spyware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common social engineering technique?

Vishing

Spoofing

Shoulder Surfing

Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a Denial of Service (DoS) attack aim to achieve?

To provide additional resources to a service.

To disrupt the normal functioning of a targeted system or service.

To steal sensitive information from a user.

To enhance the performance of a targeted system.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a Man-in-the-Middle (MITM) attack, what is the attacker trying to do?

The attacker is trying to establish a secure connection between two parties.

The attacker is trying to steal the identity of one of the parties.

The attacker is trying to intercept and manipulate communication between two parties.

The attacker is trying to enhance the communication speed between two parties.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is often disguised as legitimate software?

Trojan horse

Ransomware

Virus

Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of ransomware?

To extort money from victims.

To protect data from unauthorized access.

To improve system performance.

To delete files permanently.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware?

Trojan

Firewall

Spyware

Antivirus

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?