Cyber Threat Scenarios Quiz

Cyber Threat Scenarios Quiz

12th Grade

7 Qs

quiz-placeholder

Similar activities

การโจมตีทางไซเบอร์ (Cyber Attack)

การโจมตีทางไซเบอร์ (Cyber Attack)

9th - 12th Grade

10 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Understanding DDoS Attacks

Understanding DDoS Attacks

9th - 12th Grade

9 Qs

CSF U4 Data p2

CSF U4 Data p2

9th - 12th Grade

6 Qs

BTEC cyber security

BTEC cyber security

9th - 12th Grade

10 Qs

รูปแบบภัยคุกคามทางไซเบอร์

รูปแบบภัยคุกคามทางไซเบอร์

9th - 12th Grade

10 Qs

Cyber Security

Cyber Security

12th Grade - Professional Development

8 Qs

Session and Spoofing

Session and Spoofing

9th - 12th Grade

10 Qs

Cyber Threat Scenarios Quiz

Cyber Threat Scenarios Quiz

Assessment

Quiz

Computers

12th Grade

Medium

Created by

alaa jaber

Used 1+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small business owner receives an alert from their email provider indicating multiple failed login attempts on their email account. An attacker is using a brute force attack, trying various password combinations to gain access. The attacker could potentially access sensitive business communications if successful.

Phishing

Data Interception

Brute Force Attack

DDoS Attack

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A student is using public Wi-Fi at a coffee shop to check their bank account. An attacker on the same network intercepts the data being transmitted and captures login credentials, leading to unauthorized access to the student's bank account and personal information.

Data Interception

Brute Force Attack

Malware

Phishing

DDoS Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An online retail store experiences a sudden surge in traffic, causing their website to crash and become unavailable. A competitor's DDoS attack floods the store's server with requests, overwhelming it and making it impossible for legitimate customers to make purchases.

Phishing

Malware

Data Interception

Brute Force Attack

DDoS Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker gains unauthorized access to a company's internal network by exploiting a vulnerability in their software. The hacker steals confidential client data, including financial records and personal information, which is then sold on the dark web.

Malware

Brute Force Attack

Data Interception

DDoS Attack

Phishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee downloads a file from an untrusted source, which contains a Trojan horse. The malware silently installs itself on the company's network, giving the attacker access to sensitive data and allowing them to spy on internal communications.

Brute Force Attack

Data Interception

Malware

Phishing

DDoS Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives an email that appears to be from their bank, asking them to click a link and update their account information. The email is a phishing attempt, and by clicking the link, the user unknowingly provides their account credentials to the attacker, who then accesses their bank account.

Brute Force Attack

Malware

Phishing

DDoS Attack

Data Interception

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user tries to visit their bank's website, but due to a pharming attack, they are redirected to a fake site that looks identical to the real one. The user enters their login details, which are captured by the attackers and used to access their account.

Malware

Pharming

Brute Force Attack

Data Interception

DDoS Attack