Threat Landscape Review Questions

Threat Landscape Review Questions

1st - 5th Grade

20 Qs

quiz-placeholder

Similar activities

SQL BASIS DATA

SQL BASIS DATA

2nd Grade

20 Qs

Unit 1 Key Terms Revision

Unit 1 Key Terms Revision

3rd Grade

20 Qs

ICT, Netiquette, Privacy, Passwords and Permissions

ICT, Netiquette, Privacy, Passwords and Permissions

5th Grade

15 Qs

ICT G4 Revision lesson 1&2

ICT G4 Revision lesson 1&2

4th Grade

17 Qs

Internet and App script

Internet and App script

5th Grade - University

22 Qs

Grade 02

Grade 02

2nd Grade

20 Qs

Introduction to Cybersecurity & Safe Online Behavior Quiz

Introduction to Cybersecurity & Safe Online Behavior Quiz

5th Grade

15 Qs

ICT EXAM FOR YEAR 3

ICT EXAM FOR YEAR 3

3rd Grade

20 Qs

Threat Landscape Review Questions

Threat Landscape Review Questions

Assessment

Quiz

Information Technology (IT)

1st - 5th Grade

Practice Problem

Hard

Created by

Ali Chihadih

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an internal threat?

Hacker launching ransomware from another country

Employee accidentally clicking a phishing link

Government cyber warfare operation

Hacktivist defacing a website

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which domain deals with the physical protection of devices and infrastructure?

Cloud

Web

Physical

Network

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is a network-based attack?

SQL Injection

DDoS (Denial of Service)

Stolen USB stick

Website defacement

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are cloud services often a target?

They are used only by governments

They are isolated from the internet

One misconfiguration can expose millions of users

They are never updated

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is an example of a web attack?

Malware spreading through USBs

SQL Injection in a shopping site

Man-in-the-Middle on Wi-Fi

Power outage in a data center

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hacktivists are mainly motivated by:

Money

Fun

Political or social messages

Selling stolen data

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Stuxnet attack (2010) that targeted nuclear plants is an example of:

Criminals

Hacktivists

State-Sponsored actors

Insider threat

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?