Cybersecurity Threats Quiz

Cybersecurity Threats Quiz

University

10 Qs

quiz-placeholder

Similar activities

1.3 - Surveying the Cyberspace

1.3 - Surveying the Cyberspace

University

15 Qs

Cross-Site Scripting

Cross-Site Scripting

University

10 Qs

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Network Forensics and Log Capturing

Network Forensics and Log Capturing

University

15 Qs

Cross-Site Scripting

Cross-Site Scripting

University

10 Qs

Cross Site Scripting

Cross Site Scripting

University

10 Qs

Cybersecurity Threats Quiz

Cybersecurity Threats Quiz

Assessment

Quiz

Computers

University

Medium

Created by

Jenefa Engineering

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives an email claiming to be from their software provider, offering a "critical update" for their operating system. After clicking the attachment, the user’s computer begins to act strangely—files are encrypted, and a ransom message appears demanding payment in Bitcoin for file decryption.

Phishing

Ransomware

Trojan Horse

Worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A major online retailer experiences a sudden and significant slowdown of its website during the holiday shopping season. Customers are unable to make purchases or load the site, and the server logs show a high volume of traffic requests originating from various sources.

Distributed Denial of Service (DDoS)

Cross-Site Scripting (XSS)

SQL Injection

Man-in-the-Middle Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee receives an email from a "trusted vendor" requesting that they verify their account credentials by clicking on a link. The email appears official, with the company logo and professional language. Upon clicking the link, the employee is directed to a website that looks identical to the vendor’s login page, but the URL is slightly misspelled.

Man-in-the-Middle Attack

Phishing

Denial of Service

SQL Injection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While using public Wi-Fi in a coffee shop, a user logs into their online banking account. Unknown to them, an attacker is intercepting the communication between the user and the bank’s server. The attacker is able to capture the user’s login credentials and access their bank account.

Man-in-the-Middle Attack

Cross-Site Scripting (XSS)

Phishing

SQL Injection

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker discovers a vulnerability in an online store's login page. The login form doesn't properly validate user input, so the attacker submits an SQL query as their username. This allows the attacker to access the store's database and retrieve customer information, including passwords and credit card details.

SQL Injection

Phishing

Cross-Site Scripting (XSS)

Ransomware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user posts a comment on a website with an embedded JavaScript code that automatically executes when another user views the comment. The script steals the second user's session cookies, allowing the attacker to hijack their account.

Cross-Site Scripting (XSS)

SQL Injection

Phishing

Denial of Service

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee at a large organization accesses confidential files from the company’s server, which they have no legitimate need to view, and later leaks them to a competitor for personal financial gain.

Insider Threat

Ransomware

Phishing

Man-in-the-Middle Attack

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?