A user receives an email claiming to be from their software provider, offering a "critical update" for their operating system. After clicking the attachment, the user’s computer begins to act strangely—files are encrypted, and a ransom message appears demanding payment in Bitcoin for file decryption.

Cybersecurity Threats Quiz

Quiz
•
Computers
•
University
•
Medium
Jenefa Engineering
Used 1+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Phishing
Ransomware
Trojan Horse
Worm
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A major online retailer experiences a sudden and significant slowdown of its website during the holiday shopping season. Customers are unable to make purchases or load the site, and the server logs show a high volume of traffic requests originating from various sources.
Distributed Denial of Service (DDoS)
Cross-Site Scripting (XSS)
SQL Injection
Man-in-the-Middle Attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee receives an email from a "trusted vendor" requesting that they verify their account credentials by clicking on a link. The email appears official, with the company logo and professional language. Upon clicking the link, the employee is directed to a website that looks identical to the vendor’s login page, but the URL is slightly misspelled.
Man-in-the-Middle Attack
Phishing
Denial of Service
SQL Injection
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While using public Wi-Fi in a coffee shop, a user logs into their online banking account. Unknown to them, an attacker is intercepting the communication between the user and the bank’s server. The attacker is able to capture the user’s login credentials and access their bank account.
Man-in-the-Middle Attack
Cross-Site Scripting (XSS)
Phishing
SQL Injection
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker discovers a vulnerability in an online store's login page. The login form doesn't properly validate user input, so the attacker submits an SQL query as their username. This allows the attacker to access the store's database and retrieve customer information, including passwords and credit card details.
SQL Injection
Phishing
Cross-Site Scripting (XSS)
Ransomware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user posts a comment on a website with an embedded JavaScript code that automatically executes when another user views the comment. The script steals the second user's session cookies, allowing the attacker to hijack their account.
Cross-Site Scripting (XSS)
SQL Injection
Phishing
Denial of Service
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee at a large organization accesses confidential files from the company’s server, which they have no legitimate need to view, and later leaks them to a competitor for personal financial gain.
Insider Threat
Ransomware
Phishing
Man-in-the-Middle Attack
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Quiz sobre Ataques a Redes Informáticas

Quiz
•
University
10 questions
Theft and Script Kiddies

Quiz
•
University
10 questions
Cross-Site Scripting

Quiz
•
University
10 questions
Cybersecurity Attack Types Quiz

Quiz
•
5th Grade - University
10 questions
ITE-13-Quiz-02

Quiz
•
University
10 questions
Phishing Quiz

Quiz
•
University
10 questions
Understanding Cybersecurity

Quiz
•
5th Grade - Professio...
15 questions
7.7 Software Security Review

Quiz
•
8th Grade - University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade