3.3: What Type of Attack? Cyber Threats

3.3: What Type of Attack? Cyber Threats

6th - 8th Grade

12 Qs

quiz-placeholder

Similar activities

Modern Technology

Modern Technology

7th - 9th Grade

15 Qs

Mr. Chaffin - Syllabus Quiz

Mr. Chaffin - Syllabus Quiz

8th Grade

10 Qs

sistemas operativos

sistemas operativos

1st - 10th Grade

10 Qs

Engineers & The Engineering Design Process

Engineers & The Engineering Design Process

6th - 8th Grade

15 Qs

Who are you Online?

Who are you Online?

6th Grade

11 Qs

Engineering Design Process Quiz

Engineering Design Process Quiz

7th Grade

12 Qs

Estación de radio por internet

Estación de radio por internet

8th - 11th Grade

11 Qs

Ventajas y Desventajas de las Tics

Ventajas y Desventajas de las Tics

2nd Grade - University

10 Qs

3.3: What Type of Attack? Cyber Threats

3.3: What Type of Attack? Cyber Threats

Assessment

Quiz

Instructional Technology

6th - 8th Grade

Hard

Created by

Joseph Ferraro

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker impersonates a high-ranking executive, such as the CEO, and emails a finance department employee, instructing them to urgently transfer a large sum of money to an external account. The email is crafted to look legitimate and create a sense of urgency, leading the employee to bypass normal verification procedures.

phishing

malware

ransomware

social engineering

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ransomware worm that spread rapidly in 2017, encrypting hundreds of thousands of computers worldwide. It exploited a vulnerability in Microsoft Windows.

phishing

malware

ransomware

social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Colonial Pipeline, a major US fuel pipeline, was shut down due to an attack. The attackers, DarkSide, demanded and received a ransom payment.

phishing

malware

ransomware

social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives an email that appears to be from their bank, warning of suspicious activity on their account. The email contains a link to a fake website that looks identical to the bank's site, where the user is prompted to enter their login credentials. The attacker then steals this information.

phishing

malware

ransomware

social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An email claims a package could not be delivered and asks the recipient to click a link to update their address. The link leads to a malicious website that installs malware.

phishing

malware

ransomware

social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker leaves a USB drive labeled 'Confidential HR Files' in a common area. A curious employee plugs the drive into their computer, unwittingly installing malware.

phishing

malware

ransomware

social engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A sophisticated computer worm discovered in 2010 that targeted Iran's nuclear facilities. It damaged centrifuges and disrupted the country's nuclear program.

phishing

malware

ransomware

social engineering

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?