
Cybersecurity Threats Quiz
Authored by Jenefa Engineering
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user receives an email claiming to be from their software provider, offering a "critical update" for their operating system. After clicking the attachment, the user’s computer begins to act strangely—files are encrypted, and a ransom message appears demanding payment in Bitcoin for file decryption.
Phishing
Ransomware
Trojan Horse
Worm
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A major online retailer experiences a sudden and significant slowdown of its website during the holiday shopping season. Customers are unable to make purchases or load the site, and the server logs show a high volume of traffic requests originating from various sources.
Distributed Denial of Service (DDoS)
Cross-Site Scripting (XSS)
SQL Injection
Man-in-the-Middle Attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee receives an email from a "trusted vendor" requesting that they verify their account credentials by clicking on a link. The email appears official, with the company logo and professional language. Upon clicking the link, the employee is directed to a website that looks identical to the vendor’s login page, but the URL is slightly misspelled.
Man-in-the-Middle Attack
Phishing
Denial of Service
SQL Injection
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While using public Wi-Fi in a coffee shop, a user logs into their online banking account. Unknown to them, an attacker is intercepting the communication between the user and the bank’s server. The attacker is able to capture the user’s login credentials and access their bank account.
Man-in-the-Middle Attack
Cross-Site Scripting (XSS)
Phishing
SQL Injection
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker discovers a vulnerability in an online store's login page. The login form doesn't properly validate user input, so the attacker submits an SQL query as their username. This allows the attacker to access the store's database and retrieve customer information, including passwords and credit card details.
SQL Injection
Phishing
Cross-Site Scripting (XSS)
Ransomware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A user posts a comment on a website with an embedded JavaScript code that automatically executes when another user views the comment. The script steals the second user's session cookies, allowing the attacker to hijack their account.
Cross-Site Scripting (XSS)
SQL Injection
Phishing
Denial of Service
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An employee at a large organization accesses confidential files from the company’s server, which they have no legitimate need to view, and later leaks them to a competitor for personal financial gain.
Insider Threat
Ransomware
Phishing
Man-in-the-Middle Attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?