Search Header Logo

Cyber threats

Authored by SAARA R

Computers

University

Used 3+ times

Cyber threats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You download a "free movie player" app, but later notice your webcam light turning on by itself. What is the most likely cause?

A) Trojan

B) Worm

C) Ransomware

D) Phishing

Answer explanation

The webcam light turning on unexpectedly suggests unauthorized access, likely due to a Trojan. Trojans disguise themselves as legitimate software, allowing attackers to control your device, unlike worms, ransomware, or phishing.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An employee reports their system is slowing down, showing pop-ups, and antivirus alerts for "suspicious programs." What type of cyber threat is this most likely?

Social Engineering

Malware infection

DDoS attack

Insider threat

Answer explanation

The symptoms of system slowdown, pop-ups, and antivirus alerts indicate a malware infection. These are common signs of malicious software that can compromise system performance and security.

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A student shares a pirated software installer with friends. Everyone who installs it finds files mysteriously deleted. What is this?

Worm

Phishing

Virus

Insider Threat

Answer explanation

The situation describes a virus, which is malicious software that can delete files on a computer. Sharing pirated software often leads to the spread of such viruses, causing harm to users' systems.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization notices its email server being overloaded after one infected computer starts sending malicious emails to all contacts. What is this?

Virus

Phishing

Trojan

Worm

Answer explanation

The situation describes a computer spreading malicious emails, which is characteristic of a worm. Unlike viruses, worms can replicate and spread independently across networks, causing server overload.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A company HR document becomes inaccessible after multiple employees share and open it. The issue keeps spreading across shared drives. What caused this?

MitM Attack

Virus

Ransomware

Trojan

Answer explanation

The issue of the HR document becoming inaccessible after being shared indicates a virus infection. Viruses can spread through shared files, causing documents to become corrupted or inaccessible, unlike ransomware or other malware.

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A hospital’s internal network slows down drastically, but no one downloaded or clicked anything suspicious. What’s the most probable cause?

Worm

Data Breach

Social Engineering

Virus

Answer explanation

A worm can spread through a network without user interaction, consuming bandwidth and causing slowdowns. Unlike viruses, worms replicate independently, making them a likely cause for the hospital's network issues.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee installs a "system cleaner" tool. Later, unknown programs run in the background, and data is being stolen. Which threat is this?

Worm

MitM

Trojan

Virus

Answer explanation

The scenario describes a 'system cleaner' that is actually a Trojan, as it disguises itself as legitimate software but allows unknown programs to run and steal data.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?