Search Header Logo

Cybersecurity Fundamentals

Authored by TDX Facilitator

Education

Professional Development

Used 8+ times

Cybersecurity Fundamentals
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The presence of a weakness in a system, program, or network is referred to as a:

vulnerability

exploit

adware

malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements is true about the trojans?

Trojans spread throughout the network without user intervention

Trojans conceal themselves by convincing users that it is a legitimate file.

Trojans encrypt user files and documents and demand payment to decrypt them.

Trojans display ads on web browser screens.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which is NOT an example of a Social Engineering threat:

Spear Phishing

Vishing

Whaling

Denial of Service (DoS)

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the typical attributes of a spear phishing attack? (Choose two)

Focused & personalized

Uses email spoofing techniques

Large number of recipients (Mass spam)

Smaller number of recipients

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which Phishing technique relies of phone audio interactions to conduct further social engineering?

Vishing

Smishing

Whaling

Spear Phishing

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are some ways to identify potential phishing emails: (Select all that apply)

Spelling & grammar mistakes

Suspicious links or attachments

Threatening language with demands

Unexpected request for personal information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of cyber attack attempts to intercept data between sender(s) & recipients(s)?

Denial of Service

Man in the Middle

Ransomware

Brute Force

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?