
IASQ3Exam

Quiz
•
Computers
•
Professional Development
•
Hard
elisa berog
Used 7+ times
FREE Resource
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your company’s website has been receiving a ______________________, slowing it down significantly. After investigating, you determine it to be a Distributed Denial-of-Service (DDoS) attack, where numerous computers around the world are sending requests to your site continuously without their owners’ knowledge.
Malware infection
Phishing scam
Massive volume of traffic
Targeted advertisement
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While inspecting a system, a technician notices that a software application is bypassing the usual ______________________ and gaining access to certain restricted files. The entry method, identified as Backdoor access, seems to avoid standard security protocols altogether.
Security protocols
Login authentication
System firewalls
User permissions
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Your IT team finds that a piece of software on multiple devices within your organization is displaying ______________________ and redirecting users to promotional sites. This behavior is identified as Adware, which generates revenue by showing unwanted advertisements. What type of attack is most likely responsible?
Unwanted pop-ups
Redirecting traffic
Malicious ads
Forced downloads
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security weakness is discovered in a widely used content management system (CMS). Attackers craft a malicious query to exploit the flaw, allowing them to bypass authentication and gain access to sensitive user data stored in the system's database. What type of attack is this?
SQL Injection
Cross-Site Scripting (XSS)
Directory Traversal
File Inclusion
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While monitoring network traffic, your IT team notices that an automated script is being used to flood the company’s network with ______________________, creating significant network delays. This program runs at a speed much higher than what a human could achieve. This behavior is identified as a Distributed Denial-of-Service (DDoS) attack, where systems are overwhelmed with excessive requests.
HTTP requests
Network traffic
Automated scripts
Delayed responses
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user receives an email asking them to reset their password through a link that leads to a fake login page designed to steal their credentials. What type of attack is this?
Phishing
Spoofing
Keylogging
SQL Injection
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user installs what they believe to be a legitimate utility software. However, after installation, the program quietly manipulates system settings and steals personal data without the user’s consent. What type of malware is this?
Trojan Horse
Spyware
Rootkit
Adware
Create a free account and access millions of resources
Similar Resources on Wayground
45 questions
Davinci Resolve 17 Fusion 101

Quiz
•
11th Grade - Professi...
54 questions
OneBanc

Quiz
•
Professional Development
50 questions
Robotic Process Automation by Chayan Bhattacharjee

Quiz
•
Professional Development
51 questions
ITF+ Study Quiz 3

Quiz
•
Professional Development
48 questions
Core Java Concepts Quiz (1)

Quiz
•
Professional Development
45 questions
Networking and Computer Maintenance Quiz

Quiz
•
Professional Development
50 questions
SOCRATECHS

Quiz
•
1st Grade - Professio...
50 questions
Az-900 Prep 2

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade