2 Understanding Cybercrime and Cybersecurity

2 Understanding Cybercrime and Cybersecurity

University

26 Qs

quiz-placeholder

Similar activities

PIT B Edmentum Post Test 8

PIT B Edmentum Post Test 8

9th Grade - University

21 Qs

ISYS3439 - Cyber GRC

ISYS3439 - Cyber GRC

University

26 Qs

ICS - Bellwork - 8/18/25 - 8/22/25

ICS - Bellwork - 8/18/25 - 8/22/25

3rd Grade - University

21 Qs

Moini Ch12 Computers

Moini Ch12 Computers

11th Grade - Professional Development

24 Qs

INTERNET OF THINGS

INTERNET OF THINGS

University

23 Qs

Kuiz bola jaring - bib & posisi

Kuiz bola jaring - bib & posisi

1st Grade - University

22 Qs

Sistemas de Información para la Administración.

Sistemas de Información para la Administración.

University

21 Qs

2 Understanding Cybercrime and Cybersecurity

2 Understanding Cybercrime and Cybersecurity

Assessment

Quiz

Other

University

Easy

Created by

Rabiul Hasan

Used 1+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which cyber threat actor is most likely to attack for financial gain?

Cyber terrorists

Hacktivists

Organised cybercriminals

Insider threats

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is an insider threat?

A hacker outside an organization

An employee or trusted person who misuses access

A government agency monitoring cyber activity

A business that reports cybercrimes

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What do hacktivists typically aim to achieve?

Financial gain

Political or social change

Destroy government databases

Create secure business networks

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is NOT an example of a cyber threat actor?

Cybercriminals

Hacktivists

Social media users

State-sponsored attackers

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is considered a critical national infrastructure (CNI) target?

Social media accounts

Power grids and water supplies

Online gaming platforms

E-commerce websites

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which type of cyberattack is most likely to target consumers?

DDoS attack

Phishing scams

SQL injection

Man-in-the-middle attacks

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why do businesses rely on cybersecurity?

To protect customer data and prevent financial losses

To increase the speed of email communications

To develop software faster

To eliminate the need for employees

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?