Unit 2 Test: Advanced Threats and Attack Techniques

Unit 2 Test: Advanced Threats and Attack Techniques

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

REDES I-medios no guiados

REDES I-medios no guiados

1st - 12th Grade

20 Qs

KD 3.1_Aplikasi Pengolah Angka / Spreadsheet

KD 3.1_Aplikasi Pengolah Angka / Spreadsheet

10th Grade

15 Qs

SABERES PREVIOS MANTENIMIENTO PC

SABERES PREVIOS MANTENIMIENTO PC

11th Grade

16 Qs

Text and Image representation

Text and Image representation

11th Grade

22 Qs

Informática 1

Informática 1

10th Grade

20 Qs

Diagnóstico 1er Cuatrimestre - IA II

Diagnóstico 1er Cuatrimestre - IA II

12th Grade

17 Qs

quizz tkinter

quizz tkinter

11th Grade - University

20 Qs

Ôn tập học kì 1-CN7

Ôn tập học kì 1-CN7

1st - 12th Grade

15 Qs

Unit 2 Test: Advanced Threats and Attack Techniques

Unit 2 Test: Advanced Threats and Attack Techniques

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

JT Ruffin

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Social Engineering?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Pharming?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Credential Harvesting?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Typosquatting?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Malware?

A terrible software that is programmed to attack computer’s OS (Operating System), programs or components

An infected malware that is designed to replicate and spread from device to device

A memory-resident malware that can run without user intervention and replicate over network resources

Backdoor malware that mimics the functionality of legitimate remote control programs, but designed to operate covertly

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Virus?

A terrible software that is programmed to attack computer’s OS (Operating System), programs or components

An infected malware that is designed to replicate and spread from device to device

A memory-resident malware that can run without user intervention and replicate over network resources

Backdoor malware that mimics the functionality of legitimate remote control programs, but designed to operate covertly

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?