7in7 #01 Day-2

7in7 #01 Day-2

Professional Development

5 Qs

quiz-placeholder

Similar activities

Security Trends

Security Trends

Professional Development

7 Qs

Pre Test CTIA

Pre Test CTIA

Professional Development

10 Qs

Identifying Malware

Identifying Malware

Professional Development

10 Qs

Post Assessment - Cybersecurity Awareness

Post Assessment - Cybersecurity Awareness

9th Grade - Professional Development

10 Qs

Proteccion Contra Malware y Phishing

Proteccion Contra Malware y Phishing

Professional Development

10 Qs

Cyber Security Quiz

Cyber Security Quiz

Professional Development

10 Qs

OSI Security Architecture

OSI Security Architecture

Professional Development

10 Qs

Cyber Security

Cyber Security

Professional Development

10 Qs

7in7 #01 Day-2

7in7 #01 Day-2

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Yuktha Club

Used 2+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the primary difference between active attacks and passive attacks in cybersecurity?

Active attacks involve physical intrusion, while passive attacks occur over the internet.

Active attacks only occur during the daytime, while passive attacks occur at night.

Active attacks directly impact the target, while passive attacks focus on eavesdropping.

Active attacks are always detected, while passive attacks go unnoticed.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which cyber attack involves tricking individuals into revealing sensitive information through psychological manipulation?

DDoS Attack

Phishing Attack

Malware Attack

SQL Injection Attack

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In the Colonial Pipeline Ransomware Attack, what was the consequence of the cyberattack?

Fuel shortages and price spikes

Water supply contamination

Internet service disruptions

Power grid failures

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What was the main objective of the WannaCry Ransomware attack?

Stealing credit card information

Accessing government secrets

Disrupting critical infrastructure

Encrypting files and demanding ransom

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which cyber attack targeted a major IT management software provider, compromising government agencies and corporations?

WannaCry Ransomware

Stuxnet Worm

NotPetya/ExPert Ransomware

SolarWinds Supply Chain Attack