Cybersecurity Threats Quiz

Cybersecurity Threats Quiz

University

10 Qs

quiz-placeholder

Similar activities

INFOASSURANCE

INFOASSURANCE

University

10 Qs

Cyber Security (OE)

Cyber Security (OE)

University

15 Qs

Cross-Site Scripting

Cross-Site Scripting

University

10 Qs

Chapter 3 Computer Attacks vs Network Attacks

Chapter 3 Computer Attacks vs Network Attacks

University

10 Qs

Cyber Security Quiz

Cyber Security Quiz

University

10 Qs

Social Engineering

Social Engineering

8th Grade - Professional Development

8 Qs

Quiz No. 3 - Network and Internet Privacy and Security

Quiz No. 3 - Network and Internet Privacy and Security

University

10 Qs

Computer Threats

Computer Threats

KG - Professional Development

8 Qs

Cybersecurity Threats Quiz

Cybersecurity Threats Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Jenefa Engineering

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives an email claiming to be from their software provider, offering a "critical update" for their operating system. After clicking the attachment, the user’s computer begins to act strangely—files are encrypted, and a ransom message appears demanding payment in Bitcoin for file decryption.

Phishing

Ransomware

Trojan Horse

Worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A major online retailer experiences a sudden and significant slowdown of its website during the holiday shopping season. Customers are unable to make purchases or load the site, and the server logs show a high volume of traffic requests originating from various sources.

Distributed Denial of Service (DDoS)

Cross-Site Scripting (XSS)

SQL Injection

Man-in-the-Middle Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee receives an email from a "trusted vendor" requesting that they verify their account credentials by clicking on a link. The email appears official, with the company logo and professional language. Upon clicking the link, the employee is directed to a website that looks identical to the vendor’s login page, but the URL is slightly misspelled.

Man-in-the-Middle Attack

Phishing

Denial of Service

SQL Injection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While using public Wi-Fi in a coffee shop, a user logs into their online banking account. Unknown to them, an attacker is intercepting the communication between the user and the bank’s server. The attacker is able to capture the user’s login credentials and access their bank account.

Man-in-the-Middle Attack

Cross-Site Scripting (XSS)

Phishing

SQL Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker discovers a vulnerability in an online store's login page. The login form doesn't properly validate user input, so the attacker submits an SQL query as their username. This allows the attacker to access the store's database and retrieve customer information, including passwords and credit card details.

SQL Injection

Phishing

Cross-Site Scripting (XSS)

Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user posts a comment on a website with an embedded JavaScript code that automatically executes when another user views the comment. The script steals the second user's session cookies, allowing the attacker to hijack their account.

Cross-Site Scripting (XSS)

SQL Injection

Phishing

Denial of Service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee at a large organization accesses confidential files from the company’s server, which they have no legitimate need to view, and later leaks them to a competitor for personal financial gain.

Insider Threat

Ransomware

Phishing

Man-in-the-Middle Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?