IASQ3Exam

IASQ3Exam

Professional Development

50 Qs

quiz-placeholder

Similar activities

Final Exam - Data Entry & Retrieval Procedures

Final Exam - Data Entry & Retrieval Procedures

Professional Development

50 Qs

HTML Test 01

HTML Test 01

Professional Development

47 Qs

Cloud Computer v4.0-P2

Cloud Computer v4.0-P2

Professional Development

50 Qs

9628-09 City & Guilds Level 3 Award in Coding and Logic Quiz 3

9628-09 City & Guilds Level 3 Award in Coding and Logic Quiz 3

11th Grade - Professional Development

50 Qs

UF0852

UF0852

Professional Development

50 Qs

Comptia A+ Core 1 Pt.1

Comptia A+ Core 1 Pt.1

University - Professional Development

50 Qs

Word Processing

Word Processing

Professional Development

52 Qs

Test Mendix 3

Test Mendix 3

Professional Development

50 Qs

IASQ3Exam

IASQ3Exam

Assessment

Quiz

Computers

Professional Development

Hard

Created by

elisa berog

Used 7+ times

FREE Resource

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your company’s website has been receiving a ______________________, slowing it down significantly. After investigating, you determine it to be a Distributed Denial-of-Service (DDoS) attack, where numerous computers around the world are sending requests to your site continuously without their owners’ knowledge.

Malware infection

Phishing scam

Massive volume of traffic

Targeted advertisement

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While inspecting a system, a technician notices that a software application is bypassing the usual ______________________ and gaining access to certain restricted files. The entry method, identified as Backdoor access, seems to avoid standard security protocols altogether.

Security protocols

Login authentication

System firewalls

User permissions

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your IT team finds that a piece of software on multiple devices within your organization is displaying ______________________ and redirecting users to promotional sites. This behavior is identified as Adware, which generates revenue by showing unwanted advertisements. What type of attack is most likely responsible?

Unwanted pop-ups

Redirecting traffic

Malicious ads

Forced downloads

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security weakness is discovered in a widely used content management system (CMS). Attackers craft a malicious query to exploit the flaw, allowing them to bypass authentication and gain access to sensitive user data stored in the system's database. What type of attack is this?

SQL Injection

Cross-Site Scripting (XSS)

Directory Traversal

File Inclusion

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While monitoring network traffic, your IT team notices that an automated script is being used to flood the company’s network with ______________________, creating significant network delays. This program runs at a speed much higher than what a human could achieve. This behavior is identified as a Distributed Denial-of-Service (DDoS) attack, where systems are overwhelmed with excessive requests.

HTTP requests

Network traffic

Automated scripts

Delayed responses

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives an email asking them to reset their password through a link that leads to a fake login page designed to steal their credentials. What type of attack is this?

Phishing

Spoofing

Keylogging

SQL Injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user installs what they believe to be a legitimate utility software. However, after installation, the program quietly manipulates system settings and steals personal data without the user’s consent. What type of malware is this?

Trojan Horse

Spyware

Rootkit

Adware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?