Search Header Logo

Cyber Threat Scenarios Quiz

Authored by alaa jaber

Computers

12th Grade

Used 1+ times

Cyber Threat Scenarios Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A small business owner receives an alert from their email provider indicating multiple failed login attempts on their email account. An attacker is using a brute force attack, trying various password combinations to gain access. The attacker could potentially access sensitive business communications if successful.

Phishing

Data Interception

Brute Force Attack

DDoS Attack

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A student is using public Wi-Fi at a coffee shop to check their bank account. An attacker on the same network intercepts the data being transmitted and captures login credentials, leading to unauthorized access to the student's bank account and personal information.

Data Interception

Brute Force Attack

Malware

Phishing

DDoS Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An online retail store experiences a sudden surge in traffic, causing their website to crash and become unavailable. A competitor's DDoS attack floods the store's server with requests, overwhelming it and making it impossible for legitimate customers to make purchases.

Phishing

Malware

Data Interception

Brute Force Attack

DDoS Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker gains unauthorized access to a company's internal network by exploiting a vulnerability in their software. The hacker steals confidential client data, including financial records and personal information, which is then sold on the dark web.

Malware

Brute Force Attack

Data Interception

DDoS Attack

Phishing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee downloads a file from an untrusted source, which contains a Trojan horse. The malware silently installs itself on the company's network, giving the attacker access to sensitive data and allowing them to spy on internal communications.

Brute Force Attack

Data Interception

Malware

Phishing

DDoS Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives an email that appears to be from their bank, asking them to click a link and update their account information. The email is a phishing attempt, and by clicking the link, the user unknowingly provides their account credentials to the attacker, who then accesses their bank account.

Brute Force Attack

Malware

Phishing

DDoS Attack

Data Interception

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user tries to visit their bank's website, but due to a pharming attack, they are redirected to a fake site that looks identical to the real one. The user enters their login details, which are captured by the attackers and used to access their account.

Malware

Pharming

Brute Force Attack

Data Interception

DDoS Attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?