
Types of Cyberattacks Quiz

Quiz
•
Computers
•
12th Grade
•
Easy
Shervon Yak
Used 1+ times
FREE Resource
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is cryptojacking?
Unauthorized use of a victim's computing resources to mine cryptocurrency
Intercepting and eavesdropping on communication between two parties
Disrupting the normal functioning of a computer system, network, or website
Exploiting vulnerabilities in web applications
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do zero-day exploits target?
Software vulnerabilities that are unknown to the vendor or have not yet been patched
Impersonating legitimate entities to steal sensitive information
Unauthorized use of a victim's computing resources
Encrypting files or locking users out of their systems
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing?
Impersonating legitimate entities to trick users into revealing sensitive information
A type of malware
A type of denial of service attack
A type of web application vulnerability
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
Software designed to cause harm to a computer, server, or network
A type of social engineering attack
A type of software vulnerability
A type of hardware vulnerability
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do insider threats involve?
Malicious actions or security breaches perpetrated by individuals within an organization
Impersonating legitimate entities to trick users into revealing sensitive information
Disrupting the normal functioning of a computer system, network, or website
Exploiting vulnerabilities in web applications
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is ransomware?
Malware that encrypts files or locks users out of their systems until a ransom is paid
A type of social engineering attack
A type of denial of service attack
A type of web application vulnerability
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do XSS attacks involve?
Injecting malicious scripts into web pages viewed by other users
Launching coordinated attacks against a target
Exploiting unknown software vulnerabilities
Unauthorized use of a victim's computing resources
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Quiz-Application Software

Quiz
•
12th Grade
15 questions
Topic 4 - Understanding System Vulnerabilities

Quiz
•
12th Grade - University
10 questions
Technical Terms - Internet (A-Z) - Webpages

Quiz
•
12th Grade
10 questions
Technical Terms - Internet (A-Z) - Sitemap

Quiz
•
12th Grade
15 questions
Web 3 Spring Review (Part I)

Quiz
•
9th - 12th Grade
10 questions
5 stages of vulnerability management

Quiz
•
11th - 12th Grade
15 questions
CIW

Quiz
•
9th - 12th Grade
10 questions
Introduction to ICT

Quiz
•
12th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
35 questions
Computer Baseline Examination 2025-26

Quiz
•
9th - 12th Grade
13 questions
Problem Solving Process

Quiz
•
9th - 12th Grade
10 questions
Understanding Algorithms with Pseudocode and Flowcharts

Interactive video
•
9th - 12th Grade
19 questions
AP CSP Unit 1 Review (code.org)

Quiz
•
10th - 12th Grade