Search Header Logo
1.4 - Forms Of Attack

1.4 - Forms Of Attack

Assessment

Presentation

Computers

9th - 10th Grade

Practice Problem

Medium

Created by

Ayomikun J Sodipe

Used 1+ times

FREE Resource

25 Slides • 40 Questions

1

media

2

media

3

media

4

media

5

media

6

media

7

media

8

media

9

Multiple Choice

What is social engineering?

1

A network security protocol

2

A type of malware designed to disrupt systems

3

The manipulation of individuals by hackers to obtain confidential and personal information

4

A method of encrypting data

10

media

11

media

12

Multiple Choice

Which of the following is NOT a form of cyber attack listed in the slides?

1

Malware

2

Phishing

3

Firewall

4

SQL Injection

13

Open Ended

List the forms of attacks mentioned

14

media

15

media

16

media

17

media

18

media

19

media

20

Multiple Select

Which of the following are forms of attack on computer systems and networks?

1

Malware

2

Phishing

3

Encryption

4

Brute-force attacks

21

Multiple Choice

Which of the following is a common goal of phishing attacks?

1

To trick users into revealing personal information

2

To overload a server with traffic

3

To crack password encryption

4

To use software to automate attacks

22

Fill in the Blank

Malicious software is also known as ___.

23

Multiple Select

Which of the following are types of malware?

1

Viruses

2

Trojans

3

Phishing

4

Ransomware

24

Fill in the Blank

A brute force attack tries all possible ___ or key combinations to access a system or network.

25

Open Ended

Explain how brute force attacks and phishing differ in their approach to obtaining sensitive information.

26

Open Ended

Explain how malware can be used to commit fraud and identity theft, using information from the slides.

27

Multiple Select

Which of the following are key characteristics of a brute force attack?

1

Trial and error method

2

Using a computer program to automate attempts

3

Flooding a server with traffic

4

Decoding encrypted passwords

28

Open Ended

Explain how phishing attacks trick users into revealing personal information. Use details from the images to support your answer.

29

Multiple Choice

Which of the following could be considered a form of attack on computer systems and networks?

1

Phishing

2

Regular software updates

3

Data backup

4

Strong password usage

30

Multiple Choice

What is the main goal of a phishing attack?

1

To steal sensitive information through deception

2

To damage hardware

3

To speed up computer processes

4

To update software automatically

31

Multiple Choice

Which of the following types of information are commonly targeted by phishing forms?

1

Usernames, passwords, and credit/debit card details

2

Only usernames

3

Only passwords

4

Only credit/debit card details

32

Open Ended

Compare and contrast malware and phishing as forms of cyber attack. What are their main differences and similarities?

33

media

34

media

35

media

36

media

37

Multiple Select

Which of the following are characteristics of a brute force attack?

1

Trial and error method

2

Use of computer programs to automate attempts

3

Flooding a server with excessive traffic

4

Decoding encrypted passwords

38

Fill in the Blank

A brute force attack is a hacking method where an attacker tries all possible ___ or key combinations to access a system or network without permission.

39

Open Ended

Describe the main steps involved in a denial of service (DoS/DDoS) attack as shown in the image.

40

Open Ended

What are the main steps involved in a Denial of Service (DoS) attack as shown in the diagram?

41

Multiple Choice

What is the main goal of a Denial of Service (DoS) attack?

1

To overload a server and make it unavailable

2

To steal sensitive data from a server

3

To encrypt files and demand ransom

4

To guess passwords using brute force

42

Multiple Choice

Which of the following statements best describes a Denial of Service (DoS) attack?

1

It floods a server with fake traffic, causing it to become overloaded and unavailable.

2

It tricks users into revealing their passwords.

3

It uses trial and error to decode encrypted data.

4

It disguises as a trusted company to steal information.

43

Fill in the Blank

A technique known as ___ is used to monitor traffic on a network to pick out unencrypted passwords and configuration information.

44

Multiple Select

Which of the following are steps involved in data interception and theft?

1

Monitoring data streams

2

Flooding a server with fake traffic

3

Gathering sensitive information

4

Exploiting vulnerabilities in databases

45

media

46

media

47

media

48

media

49

Open Ended

Explain how an attacker can use SQL injection to gain unauthorized access to data in a database.

50

Multiple Choice

Which vulnerability does SQL injection exploit?

1

Poorly coded database applications

2

Weak passwords

3

Unencrypted network traffic

4

Outdated operating systems

51

Multiple Choice

Which of the following best describes phishing?

1

Sending emails pretending to be from reputable companies to trick individuals into revealing personal information

2

Flooding a server with useless traffic

3

Monitoring network traffic to steal passwords

4

Inserting code into text boxes to manipulate databases

52

Open Ended

Explain how network sniffing can be used by attackers to obtain sensitive information from a target.

53

Multiple Choice

Which of the following is NOT a typical form of attack on network security?

1

Phishing

2

Malware

3

Firewall

4

Denial of Service

54

Open Ended

What are some common threats to computer systems and networks that you learned about in this lesson?

55

media

56

Multiple Choice

Which of the following best describes the process of data interception and theft?

1

An attacker monitors data streams to gather sensitive information.

2

A user encrypts their data before sending it over the network.

3

A server blocks all incoming connections.

4

A firewall scans outgoing emails for viruses.

57

Open Ended

Evaluate the potential impact of cyber attacks such as malware, phishing, and brute force on organisations and networks.

58

Multiple Choice

Which of the following is NOT a form of cyber attack mentioned in the lesson objectives?

1

Malware

2

Phishing

3

Brute Force

4

Firewall

59

Multiple Select

Which of the following are characteristics of SQL injection attacks?

1

They exploit vulnerabilities in database applications.

2

They require code to be entered into text boxes.

3

They only affect encrypted data streams.

4

They are used to attack data-driven applications.

60

Open Ended

Why is network security important for individuals and organizations in today's digital world?

61

Fill in the Blank

SQL injection exploits vulnerabilities in poorly coded ___ applications.

62

Multiple Choice

What is the main goal of a brute-force attack?

1

To guess passwords or PIN numbers by trying many combinations.

2

To monitor network traffic for sensitive data.

3

To flood a server with useless traffic.

4

To insert malicious code into a database.

63

Open Ended

Compare and contrast malware and phishing as forms of cyber attack. How do their methods and targets differ?

64

Multiple Choice

Which of the following is NOT a form of attack on network security?

1

Phishing

2

Malware

3

Firewall

4

Denial of Service

65

Open Ended

What are some common threats to computer systems and networks discussed in this lesson?

media

Show answer

Auto Play

Slide 1 / 65

SLIDE