Cybersecurity Awareness

Cybersecurity Awareness

University

10 Qs

quiz-placeholder

Similar activities

UTS Pengantar Keamanan Siber dan S_Informasi

UTS Pengantar Keamanan Siber dan S_Informasi

University

10 Qs

Test sulla Sicurezza Informatica

Test sulla Sicurezza Informatica

11th Grade - University

10 Qs

Cyber Security Threats/Attacks Quiz

Cyber Security Threats/Attacks Quiz

University

10 Qs

DoS Attack Quiz

DoS Attack Quiz

University

10 Qs

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

University

10 Qs

CISC280 Week 1

CISC280 Week 1

University

10 Qs

CSF Week 2

CSF Week 2

University

10 Qs

Securing internet of things

Securing internet of things

University

10 Qs

Cybersecurity Awareness

Cybersecurity Awareness

Assessment

Quiz

Computers

University

Medium

Created by

Masood Aslam

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What type of cyber attack involves sending fraudulent emails to trick individuals into revealing personal information?

Ransomware

Malware

Spoofing

Phishing

2.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Which type of ransomware encrypts files on a victim's computer and demands payment for decryption?

File-locking ransomware

Decryption ransomware

Data-stealing ransomware

Encrypting ransomware

3.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What method is commonly used in DDoS attacks to overwhelm a target system with a flood of traffic?

Bandwidth throttling

Traffic flooding

Packet filtering

Firewall configuration

4.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

Which variant of malware disguises itself as legitimate software to infect a system?

Trojan horse

Ransomware

Worm

Spyware

5.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What social engineering technique involves manipulating individuals into divulging confidential information?

Spoofing

Vishing

Smishing

Phishing

6.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

In what type of attack does an attacker insert malicious code into a database query to gain unauthorized access?

Cross-Site Scripting

SQL Injection

Malware Injection

Phishing Attack

7.

MULTIPLE CHOICE QUESTION

20 sec • 10 pts

What cyber attack involves sending malicious links via email or messages to steal sensitive information?

Spyware

Ransomware

Phishing

Trojan Horse

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?