L7: Cybersecurity Threats Quiz

L7: Cybersecurity Threats Quiz

University

15 Qs

quiz-placeholder

Similar activities

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

Cybersecurity Fundamentals Week 3 Quiz

Cybersecurity Fundamentals Week 3 Quiz

KG - University

10 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

SYO 701 INTRO TO SECURITY Module FC-2

SYO 701 INTRO TO SECURITY Module FC-2

University

20 Qs

Assesmen Diagnostik MK2 TA 2025/2026

Assesmen Diagnostik MK2 TA 2025/2026

11th Grade - University

20 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

15 Qs

040_An Overview of Malware – CompTIA Security+ SY0-701

040_An Overview of Malware – CompTIA Security+ SY0-701

9th Grade - University

20 Qs

1.3 - Surveying the Cyberspace

1.3 - Surveying the Cyberspace

University

15 Qs

L7: Cybersecurity Threats Quiz

L7: Cybersecurity Threats Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Jerry Jackson Bent

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a threat, vulnerability, and attack?

C. A threat is a deliberate act, a vulnerability is a possibility of an attack, and an attack is a weakness

B. A threat is a weakness, a vulnerability is a possibility of an attack, and an attack is a deliberate act

D. A threat is a weakness, a vulnerability is a deliberate act, and an attack is a possibility of an attack

A. A threat is a possibility of an attack, a vulnerability is a weakness, and an attack is a deliberate act

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A. Software designed to enhance system performance

D. Software designed to enhance network speed

C. Software designed to improve network security

B. Software designed to interfere with system operation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware can replicate independently and exploit vulnerabilities in networks?

D. Ransomware

C. Trojan horse

B. Worm

A. Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between a virus, worm, and trojan horse?

C. Viruses need human intervention, worms need human intervention, trojan horse can replicate independently

B. Viruses can replicate independently, worms need human intervention, trojan horse does not need to be attached to an executable file

D. Viruses can replicate independently, worms can replicate independently, trojan horse needs human intervention

A. Viruses need human intervention, worms can replicate independently, trojan horse does not need to be attached to an executable file

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware uses encryptions with unknown keys and locks down systems until a ransom is paid?

D. Ransomware

B. Worm

A. Virus

C. Trojan horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware can activate malicious code through triggers such as certain dates or times?

D. Spyware

A. Logic Bomb

C. Rootkit

B. Backdoor

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a backdoor malware?

B. To gain remote access to the computer

D. All of the above

A. To exploit the operating system's vulnerability

C. To modify access levels and system files

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?