Understanding Cybersecurity Threats and Scams

Understanding Cybersecurity Threats and Scams

11th Grade

20 Qs

quiz-placeholder

Similar activities

NRF Customer Service & Sales: "Go the Extra Mile"

NRF Customer Service & Sales: "Go the Extra Mile"

9th - 12th Grade

15 Qs

EDPM Paper 01 General Profiency F. Gumbs

EDPM Paper 01 General Profiency F. Gumbs

7th - 12th Grade

20 Qs

Computers and IT

Computers and IT

9th Grade - University

20 Qs

Cyber Security @ Workplace

Cyber Security @ Workplace

KG - Professional Development

20 Qs

Post Secondary Choices

Post Secondary Choices

8th - 12th Grade

20 Qs

Hard Skills vs Soft Skills

Hard Skills vs Soft Skills

9th - 12th Grade

20 Qs

Computer Basics

Computer Basics

KG - 12th Grade

21 Qs

fun codeing

fun codeing

11th Grade - Professional Development

20 Qs

Understanding Cybersecurity Threats and Scams

Understanding Cybersecurity Threats and Scams

Assessment

Quiz

Professional Development

11th Grade

Easy

Created by

Elshedai Lemeneh

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a "watering hole attack" in cybersecurity?

To steal passwords from a specific individual

To compromise a website frequently visited by a target group

To send phishing emails to random users

To install malware on a user's device

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware that replicates itself to spread to other computers?

Trojan

Worm

Spyware

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "pretexting" in the context of social engineering?

Creating a fake website to steal information

Using a fabricated scenario to obtain information

Sending unsolicited emails to users

Manipulating search engine results

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves tricking a user into entering their credentials on a fake website that looks legitimate?

Pharming

Tailgating

Dumpster diving

Shoulder surfing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main characteristic of a "logic bomb" in cybersecurity?

It encrypts files and demands a ransom

It activates under specific conditions

It records keystrokes

It spreads through email attachments

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a targeted phishing attack aimed at high-profile individuals?

Spear phishing

Whaling

Smishing

Vishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "tailgating" in the context of physical security?

Following someone into a restricted area without authorization

Sending fake invoices to a company

Listening to conversations to gather information

Creating a fake identity to gain access

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?