Computer Attacks and Threats

Computer Attacks and Threats

University

10 Qs

quiz-placeholder

Similar activities

Computer Basics 2 - CESA

Computer Basics 2 - CESA

7th Grade - University

10 Qs

Node.js

Node.js

University

10 Qs

Parcial - Módulo IV

Parcial - Módulo IV

1st Grade - University

15 Qs

Habilidades digitales

Habilidades digitales

University

15 Qs

Software Testing

Software Testing

University

10 Qs

Chapter 2: Input Device

Chapter 2: Input Device

12th Grade - University

12 Qs

Hệ Điều Hành Của Máy Tính

Hệ Điều Hành Của Máy Tính

10th Grade - University

10 Qs

FSA,DFA dan NFA

FSA,DFA dan NFA

University

15 Qs

Computer Attacks and Threats

Computer Attacks and Threats

Assessment

Quiz

Computers

University

Practice Problem

Medium

Created by

Dorcah Nyakeriga

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a phishing attack?

A phishing attack is a type of fishing competition where participants catch as many fish as possible in a given time frame.

A phishing attack is a type of gardening technique used to grow vegetables in a small space.

A phishing attack is a type of physical exercise involving stretching and flexibility.

A phishing attack is a type of cyber attack where attackers send fraudulent emails or messages pretending to be from reputable companies or individuals in order to steal sensitive information such as login credentials or financial details.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Explain the difference between a virus and a worm.

A virus can only infect executable files, while a worm can infect any type of file

A virus spreads through email attachments, while a worm spreads through network vulnerabilities

A virus needs a host program, whereas a worm is standalone.

A virus and a worm are both types of malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a DDoS attack and how does it work?

A DDoS attack works by sending friendly messages to the target to help it improve its performance.

A DDoS attack works by asking the target politely to slow down its operations.

A DDoS attack works by sending a single source of traffic to overwhelm the target.

A DDoS attack works by flooding the target with an overwhelming amount of traffic from multiple sources, causing it to become slow or unresponsive.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Describe the concept of ransomware.

Ransomware is a type of hardware used to enhance computer performance.

Ransomware is a type of malicious software that encrypts files on a victim's computer and demands payment for decryption.

Ransomware is a type of antivirus software that protects computers from malware.

Ransomware is a form of cloud storage used to back up files securely.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is social engineering in the context of cyber attacks?

Social engineering is a tactic used by cyber attackers to exploit human psychology rather than technical vulnerabilities.

Social engineering is a type of software used to protect against cyber attacks.

Social engineering is a method of encrypting data to prevent unauthorized access.

Social engineering involves physically breaking into a building to access computer systems.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a Trojan horse infect a computer?

By physically connecting to the computer with a USB drive

By sending spam emails with malicious attachments

By exploiting vulnerabilities in the computer's operating system

By disguising itself as a harmless file or program and tricking the user into downloading and executing it.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a man-in-the-middle attack?

To enhance security measures

To establish a secure connection

To prevent data breaches

To intercept communication between two parties

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?