Cyber threats

Cyber threats

University

25 Qs

quiz-placeholder

Similar activities

test ed. Civica speciale

test ed. Civica speciale

7th Grade - University

22 Qs

Fundamentos de Arquitectura de Computadoras

Fundamentos de Arquitectura de Computadoras

University

31 Qs

Phishing dhe Deepfake AI

Phishing dhe Deepfake AI

10th Grade - University

24 Qs

FIREWALL ️‍🔥

FIREWALL ️‍🔥

University

30 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

30 Qs

Amanjaya Final Exam

Amanjaya Final Exam

University

25 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

25 Qs

Malware Types and Prevention Quiz

Malware Types and Prevention Quiz

University

25 Qs

Cyber threats

Cyber threats

Assessment

Passage

Computers

University

Hard

Created by

SAARA R

Used 3+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You download a "free movie player" app, but later notice your webcam light turning on by itself. What is the most likely cause?

A) Trojan

B) Worm

C) Ransomware

D) Phishing

Answer explanation

The webcam light turning on unexpectedly suggests unauthorized access, likely due to a Trojan. Trojans disguise themselves as legitimate software, allowing attackers to control your device, unlike worms, ransomware, or phishing.

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

An employee reports their system is slowing down, showing pop-ups, and antivirus alerts for "suspicious programs." What type of cyber threat is this most likely?

Social Engineering

Malware infection

DDoS attack

Insider threat

Answer explanation

The symptoms of system slowdown, pop-ups, and antivirus alerts indicate a malware infection. These are common signs of malicious software that can compromise system performance and security.

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A student shares a pirated software installer with friends. Everyone who installs it finds files mysteriously deleted. What is this?

Worm

Phishing

Virus

Insider Threat

Answer explanation

The situation describes a virus, which is malicious software that can delete files on a computer. Sharing pirated software often leads to the spread of such viruses, causing harm to users' systems.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An organization notices its email server being overloaded after one infected computer starts sending malicious emails to all contacts. What is this?

Virus

Phishing

Trojan

Worm

Answer explanation

The situation describes a computer spreading malicious emails, which is characteristic of a worm. Unlike viruses, worms can replicate and spread independently across networks, causing server overload.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A company HR document becomes inaccessible after multiple employees share and open it. The issue keeps spreading across shared drives. What caused this?

MitM Attack

Virus

Ransomware

Trojan

Answer explanation

The issue of the HR document becoming inaccessible after being shared indicates a virus infection. Viruses can spread through shared files, causing documents to become corrupted or inaccessible, unlike ransomware or other malware.

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

A hospital’s internal network slows down drastically, but no one downloaded or clicked anything suspicious. What’s the most probable cause?

Worm

Data Breach

Social Engineering

Virus

Answer explanation

A worm can spread through a network without user interaction, consuming bandwidth and causing slowdowns. Unlike viruses, worms replicate independently, making them a likely cause for the hospital's network issues.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee installs a "system cleaner" tool. Later, unknown programs run in the background, and data is being stolen. Which threat is this?

Worm

MitM

Trojan

Virus

Answer explanation

The scenario describes a 'system cleaner' that is actually a Trojan, as it disguises itself as legitimate software but allows unknown programs to run and steal data.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?