Search Header Logo

IASQ3Exam

Authored by elisa berog

Computers

Professional Development

Used 8+ times

IASQ3Exam
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company’s website has been receiving a ______________________, slowing it down significantly. After investigating, you determine it to be a Distributed Denial-of-Service (DDoS) attack, where numerous computers around the world are sending requests to your site continuously without their owners’ knowledge.

Malware infection

Phishing scam

Massive volume of traffic

Targeted advertisement

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While inspecting a system, a technician notices that a software application is bypassing the usual ______________________ and gaining access to certain restricted files. The entry method, identified as Backdoor access, seems to avoid standard security protocols altogether.

Security protocols

Login authentication

System firewalls

User permissions

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your IT team finds that a piece of software on multiple devices within your organization is displaying ______________________ and redirecting users to promotional sites. This behavior is identified as Adware, which generates revenue by showing unwanted advertisements. What type of attack is most likely responsible?

Unwanted pop-ups

Redirecting traffic

Malicious ads

Forced downloads

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security weakness is discovered in a widely used content management system (CMS). Attackers craft a malicious query to exploit the flaw, allowing them to bypass authentication and gain access to sensitive user data stored in the system's database. What type of attack is this?

SQL Injection

Cross-Site Scripting (XSS)

Directory Traversal

File Inclusion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While monitoring network traffic, your IT team notices that an automated script is being used to flood the company’s network with ______________________, creating significant network delays. This program runs at a speed much higher than what a human could achieve. This behavior is identified as a Distributed Denial-of-Service (DDoS) attack, where systems are overwhelmed with excessive requests.

HTTP requests

Network traffic

Automated scripts

Delayed responses

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives an email asking them to reset their password through a link that leads to a fake login page designed to steal their credentials. What type of attack is this?

Phishing

Spoofing

Keylogging

SQL Injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user installs what they believe to be a legitimate utility software. However, after installation, the program quietly manipulates system settings and steals personal data without the user’s consent. What type of malware is this?

Trojan Horse

Spyware

Rootkit

Adware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?