L7: Cybersecurity Threats Quiz

L7: Cybersecurity Threats Quiz

University

15 Qs

quiz-placeholder

Similar activities

Phishing Quiz

Phishing Quiz

University

10 Qs

Security Threats

Security Threats

10th Grade - University

20 Qs

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

Cyber EOP - Social Engineering Attacks By Mr. B

Cyber EOP - Social Engineering Attacks By Mr. B

12th Grade - University

18 Qs

S3 Computing Security Quiz

S3 Computing Security Quiz

KG - University

10 Qs

Information and Communication Technology Security - Pre-Test

Information and Communication Technology Security - Pre-Test

University

20 Qs

Cuestionario del Spear Phishing

Cuestionario del Spear Phishing

University

13 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

L7: Cybersecurity Threats Quiz

L7: Cybersecurity Threats Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Jerry Jackson Bent

Used 6+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a threat, vulnerability, and attack?

C. A threat is a deliberate act, a vulnerability is a possibility of an attack, and an attack is a weakness

B. A threat is a weakness, a vulnerability is a possibility of an attack, and an attack is a deliberate act

D. A threat is a weakness, a vulnerability is a deliberate act, and an attack is a possibility of an attack

A. A threat is a possibility of an attack, a vulnerability is a weakness, and an attack is a deliberate act

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A. Software designed to enhance system performance

D. Software designed to enhance network speed

C. Software designed to improve network security

B. Software designed to interfere with system operation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware can replicate independently and exploit vulnerabilities in networks?

D. Ransomware

C. Trojan horse

B. Worm

A. Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between a virus, worm, and trojan horse?

C. Viruses need human intervention, worms need human intervention, trojan horse can replicate independently

B. Viruses can replicate independently, worms need human intervention, trojan horse does not need to be attached to an executable file

D. Viruses can replicate independently, worms can replicate independently, trojan horse needs human intervention

A. Viruses need human intervention, worms can replicate independently, trojan horse does not need to be attached to an executable file

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware uses encryptions with unknown keys and locks down systems until a ransom is paid?

D. Ransomware

B. Worm

A. Virus

C. Trojan horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware can activate malicious code through triggers such as certain dates or times?

D. Spyware

A. Logic Bomb

C. Rootkit

B. Backdoor

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a backdoor malware?

B. To gain remote access to the computer

D. All of the above

A. To exploit the operating system's vulnerability

C. To modify access levels and system files

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?