
Understanding Cybersecurity Threats and Scams
Authored by Elshedai Lemeneh
Professional Development
11th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary goal of a "watering hole attack" in cybersecurity?
To steal passwords from a specific individual
To compromise a website frequently visited by a target group
To send phishing emails to random users
To install malware on a user's device
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a type of malware that replicates itself to spread to other computers?
Trojan
Worm
Spyware
Ransomware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is "pretexting" in the context of social engineering?
Creating a fake website to steal information
Using a fabricated scenario to obtain information
Sending unsolicited emails to users
Manipulating search engine results
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which attack involves tricking a user into entering their credentials on a fake website that looks legitimate?
Pharming
Tailgating
Dumpster diving
Shoulder surfing
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main characteristic of a "logic bomb" in cybersecurity?
It encrypts files and demands a ransom
It activates under specific conditions
It records keystrokes
It spreads through email attachments
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a targeted phishing attack aimed at high-profile individuals?
Spear phishing
Whaling
Smishing
Vishing
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is "tailgating" in the context of physical security?
Following someone into a restricted area without authorization
Sending fake invoices to a company
Listening to conversations to gather information
Creating a fake identity to gain access
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?