Unit 2 Test: Advanced Threats and Attack Techniques

Unit 2 Test: Advanced Threats and Attack Techniques

9th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Bài 11. Tệp và quản lý tệp

Bài 11. Tệp và quản lý tệp

10th Grade

20 Qs

HTML

HTML

8th - 12th Grade

15 Qs

Traffic Light Project Quiz

Traffic Light Project Quiz

9th Grade

17 Qs

Belajar Elemen 1 XI TKJ PSTS 23/24

Belajar Elemen 1 XI TKJ PSTS 23/24

11th Grade

20 Qs

CSS - Computer Systems Services

CSS - Computer Systems Services

12th Grade

20 Qs

Vocabulary of Computer

Vocabulary of Computer

12th Grade

15 Qs

Networking Quiz

Networking Quiz

8th - 9th Grade

15 Qs

Arduino

Arduino

7th - 9th Grade

15 Qs

Unit 2 Test: Advanced Threats and Attack Techniques

Unit 2 Test: Advanced Threats and Attack Techniques

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

JT Ruffin

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Social Engineering?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Phishing?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Pharming?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Credential Harvesting?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Typosquatting?

Malicious technique that manipulates victims to perform unlike actions

Combination of social engineering and spoofing that persuades a target into interacting with a malicious resource disguised as a trusted one

Passive means of redirecting users from a legitimate website to a malicious one

Campaign specifically designed to steal account credentials

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Malware?

A terrible software that is programmed to attack computer’s OS (Operating System), programs or components

An infected malware that is designed to replicate and spread from device to device

A memory-resident malware that can run without user intervention and replicate over network resources

Backdoor malware that mimics the functionality of legitimate remote control programs, but designed to operate covertly

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Virus?

A terrible software that is programmed to attack computer’s OS (Operating System), programs or components

An infected malware that is designed to replicate and spread from device to device

A memory-resident malware that can run without user intervention and replicate over network resources

Backdoor malware that mimics the functionality of legitimate remote control programs, but designed to operate covertly

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?