Types of Cyberattacks Quiz

Types of Cyberattacks Quiz

12th Grade

11 Qs

quiz-placeholder

Similar activities

BTEC UNIT 1 THE ONLINE WORLD QUIZ 2

BTEC UNIT 1 THE ONLINE WORLD QUIZ 2

12th Grade

10 Qs

NOVA Cybersecurity 101

NOVA Cybersecurity 101

6th - 12th Grade

13 Qs

Cyber Security

Cyber Security

8th - 12th Grade

10 Qs

Computers Check for Understanding

Computers Check for Understanding

8th - 12th Grade

10 Qs

Standard 3 Vocabulary

Standard 3 Vocabulary

9th - 12th Grade

13 Qs

Attacks Threats & Vulnerabilities (C1)

Attacks Threats & Vulnerabilities (C1)

9th - 12th Grade

15 Qs

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

IT Unit 11: Cybersecurity (A2 System vulnerabilities)

12th Grade

10 Qs

Blockchain Quiz

Blockchain Quiz

12th Grade

10 Qs

Types of Cyberattacks Quiz

Types of Cyberattacks Quiz

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Shervon Yak

Used 1+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is cryptojacking?

Unauthorized use of a victim's computing resources to mine cryptocurrency

Intercepting and eavesdropping on communication between two parties

Disrupting the normal functioning of a computer system, network, or website

Exploiting vulnerabilities in web applications

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do zero-day exploits target?

Software vulnerabilities that are unknown to the vendor or have not yet been patched

Impersonating legitimate entities to steal sensitive information

Unauthorized use of a victim's computing resources

Encrypting files or locking users out of their systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Impersonating legitimate entities to trick users into revealing sensitive information

A type of malware

A type of denial of service attack

A type of web application vulnerability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Software designed to cause harm to a computer, server, or network

A type of social engineering attack

A type of software vulnerability

A type of hardware vulnerability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do insider threats involve?

Malicious actions or security breaches perpetrated by individuals within an organization

Impersonating legitimate entities to trick users into revealing sensitive information

Disrupting the normal functioning of a computer system, network, or website

Exploiting vulnerabilities in web applications

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

Malware that encrypts files or locks users out of their systems until a ransom is paid

A type of social engineering attack

A type of denial of service attack

A type of web application vulnerability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do XSS attacks involve?

Injecting malicious scripts into web pages viewed by other users

Launching coordinated attacks against a target

Exploiting unknown software vulnerabilities

Unauthorized use of a victim's computing resources

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?