
Module 3 Cyber Threats and Security Awareness Quiz
Authored by Ayomide Oluwaga
Computers
Professional Development
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a hacktivist?
A state-sponsored cyber adversary
An insider threat perpetrating security violations
A cyber attacker driven by ideological motives
A malicious actor pursuing financial exploitation
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following entities exemplifies a nation-state actor in the context of cyber operations?
Conti ransomware syndicate
Anonymous collective
Script kiddies
Fancy Bear (APT28)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of threat actor is classified as an insider threat within the context of cybersecurity?
An inadvertent user inadvertently causing data breaches
An employee or contractor intentionally compromising organizational security protocols
A consortium of organized cybercriminals
A hacktivist group advocating for a specific socio-political agenda
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary motivation of organized crime syndicates?
Intelligence operations
Political machinations
Monetary profit
Ideological convictions
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is phishing in the context of cybersecurity?
A network-based attack exploiting vulnerabilities in protocols
A deceptive email or message designed to manipulate users into divulging sensitive information
An insider threat involving unauthorized access by a trusted individual
A type of malware that infiltrates systems through social engineering tactics
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following represents a technique employed in social engineering attacks?
Denial-of-Service (DoS) Attack
Voice Phishing (Vishing)
Ransomware Deployment
SQL Injection Attack
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary function of ransomware in cybersecurity?
Exfiltrates sensitive user data
Utilizes cryptographic algorithms to encrypt files and extorts a ransom for decryption keys
Propagates through network vulnerabilities
Obfuscates its presence by masquerading as legitimate applications
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?