Search Header Logo

Types of Cyberattacks Quiz

Authored by Shervon Yak

Computers

12th Grade

Used 1+ times

Types of Cyberattacks Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is cryptojacking?

Unauthorized use of a victim's computing resources to mine cryptocurrency

Intercepting and eavesdropping on communication between two parties

Disrupting the normal functioning of a computer system, network, or website

Exploiting vulnerabilities in web applications

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do zero-day exploits target?

Software vulnerabilities that are unknown to the vendor or have not yet been patched

Impersonating legitimate entities to steal sensitive information

Unauthorized use of a victim's computing resources

Encrypting files or locking users out of their systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing?

Impersonating legitimate entities to trick users into revealing sensitive information

A type of malware

A type of denial of service attack

A type of web application vulnerability

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

Software designed to cause harm to a computer, server, or network

A type of social engineering attack

A type of software vulnerability

A type of hardware vulnerability

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do insider threats involve?

Malicious actions or security breaches perpetrated by individuals within an organization

Impersonating legitimate entities to trick users into revealing sensitive information

Disrupting the normal functioning of a computer system, network, or website

Exploiting vulnerabilities in web applications

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

Malware that encrypts files or locks users out of their systems until a ransom is paid

A type of social engineering attack

A type of denial of service attack

A type of web application vulnerability

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do XSS attacks involve?

Injecting malicious scripts into web pages viewed by other users

Launching coordinated attacks against a target

Exploiting unknown software vulnerabilities

Unauthorized use of a victim's computing resources

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?