Cybersecurity Awareness

Cybersecurity Awareness

University

10 Qs

quiz-placeholder

Similar activities

Cyber forensic and security

Cyber forensic and security

University

15 Qs

iCIO Contribute - Binus University

iCIO Contribute - Binus University

University

10 Qs

Riddles

Riddles

University

10 Qs

Phishing

Phishing

University

9 Qs

Cyber Security MSc Quiz

Cyber Security MSc Quiz

University

10 Qs

Semana 10: Amenazas comunes a la seguridad.

Semana 10: Amenazas comunes a la seguridad.

University

10 Qs

QUIZ

QUIZ

University

10 Qs

Cybersecurity Final Round

Cybersecurity Final Round

University

10 Qs

Cybersecurity Awareness

Cybersecurity Awareness

Assessment

Quiz

Computers

University

Medium

Created by

Masood Aslam

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What type of cyber attack involves sending fraudulent emails to trick individuals into revealing personal information?

Ransomware

Malware

Spoofing

Phishing

2.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Which type of ransomware encrypts files on a victim's computer and demands payment for decryption?

File-locking ransomware

Decryption ransomware

Data-stealing ransomware

Encrypting ransomware

3.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What method is commonly used in DDoS attacks to overwhelm a target system with a flood of traffic?

Bandwidth throttling

Traffic flooding

Packet filtering

Firewall configuration

4.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Which variant of malware disguises itself as legitimate software to infect a system?

Trojan horse

Ransomware

Worm

Spyware

5.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What social engineering technique involves manipulating individuals into divulging confidential information?

Spoofing

Vishing

Smishing

Phishing

6.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

In what type of attack does an attacker insert malicious code into a database query to gain unauthorized access?

Cross-Site Scripting

SQL Injection

Malware Injection

Phishing Attack

7.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What cyber attack involves sending malicious links via email or messages to steal sensitive information?

Spyware

Ransomware

Phishing

Trojan Horse

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?