Search Header Logo

Understanding Cybersecurity Threats and Scams

Authored by Elshedai Lemeneh

Professional Development

11th Grade

Used 2+ times

Understanding Cybersecurity Threats and Scams
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of a "watering hole attack" in cybersecurity?

To steal passwords from a specific individual

To compromise a website frequently visited by a target group

To send phishing emails to random users

To install malware on a user's device

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a type of malware that replicates itself to spread to other computers?

Trojan

Worm

Spyware

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "pretexting" in the context of social engineering?

Creating a fake website to steal information

Using a fabricated scenario to obtain information

Sending unsolicited emails to users

Manipulating search engine results

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which attack involves tricking a user into entering their credentials on a fake website that looks legitimate?

Pharming

Tailgating

Dumpster diving

Shoulder surfing

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main characteristic of a "logic bomb" in cybersecurity?

It encrypts files and demands a ransom

It activates under specific conditions

It records keystrokes

It spreads through email attachments

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a targeted phishing attack aimed at high-profile individuals?

Spear phishing

Whaling

Smishing

Vishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "tailgating" in the context of physical security?

Following someone into a restricted area without authorization

Sending fake invoices to a company

Listening to conversations to gather information

Creating a fake identity to gain access

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?