Understanding Cybersecurity Threats and Scams

Understanding Cybersecurity Threats and Scams

11th Grade

20 Qs

quiz-placeholder

Similar activities

ICE CUP CUSS

ICE CUP CUSS

6th Grade - Professional Development

20 Qs

9.2 Homework 3

9.2 Homework 3

9th - 12th Grade

19 Qs

MTA: 98-367 Security Part 1

MTA: 98-367 Security Part 1

KG - Professional Development

20 Qs

Professional quiz

Professional quiz

11th - 12th Grade

15 Qs

Chapter 4 Test Reveiw

Chapter 4 Test Reveiw

9th - 12th Grade

24 Qs

Cyber 2 Module 9

Cyber 2 Module 9

9th Grade - Professional Development

21 Qs

CySa+ PT5: 3 of 3

CySa+ PT5: 3 of 3

9th Grade - Professional Development

20 Qs

IQ Quiz

IQ Quiz

10th Grade - University

20 Qs

Understanding Cybersecurity Threats and Scams

Understanding Cybersecurity Threats and Scams

Assessment

Quiz

Professional Development

11th Grade

Easy

Created by

Elshedai Lemeneh

Used 2+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a "watering hole attack" in cybersecurity?

To steal passwords from a specific individual

To compromise a website frequently visited by a target group

To send phishing emails to random users

To install malware on a user's device

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware that replicates itself to spread to other computers?

Trojan

Worm

Spyware

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "pretexting" in the context of social engineering?

Creating a fake website to steal information

Using a fabricated scenario to obtain information

Sending unsolicited emails to users

Manipulating search engine results

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves tricking a user into entering their credentials on a fake website that looks legitimate?

Pharming

Tailgating

Dumpster diving

Shoulder surfing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main characteristic of a "logic bomb" in cybersecurity?

It encrypts files and demands a ransom

It activates under specific conditions

It records keystrokes

It spreads through email attachments

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a targeted phishing attack aimed at high-profile individuals?

Spear phishing

Whaling

Smishing

Vishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "tailgating" in the context of physical security?

Following someone into a restricted area without authorization

Sending fake invoices to a company

Listening to conversations to gather information

Creating a fake identity to gain access

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?