Search Header Logo

Module 3 Cyber Threats and Security Awareness Quiz

Authored by Ayomide Oluwaga

Computers

Professional Development

Used 2+ times

Module 3 Cyber Threats and Security Awareness Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a hacktivist?

A state-sponsored cyber adversary

An insider threat perpetrating security violations

A cyber attacker driven by ideological motives

A malicious actor pursuing financial exploitation

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following entities exemplifies a nation-state actor in the context of cyber operations?

Conti ransomware syndicate

Anonymous collective

Script kiddies

Fancy Bear (APT28)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of threat actor is classified as an insider threat within the context of cybersecurity?

An inadvertent user inadvertently causing data breaches

An employee or contractor intentionally compromising organizational security protocols

A consortium of organized cybercriminals

A hacktivist group advocating for a specific socio-political agenda

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary motivation of organized crime syndicates?

Intelligence operations

Political machinations

Monetary profit

Ideological convictions

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is phishing in the context of cybersecurity?

A network-based attack exploiting vulnerabilities in protocols

A deceptive email or message designed to manipulate users into divulging sensitive information

An insider threat involving unauthorized access by a trusted individual

A type of malware that infiltrates systems through social engineering tactics

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following represents a technique employed in social engineering attacks?

Denial-of-Service (DoS) Attack

Voice Phishing (Vishing)

Ransomware Deployment

SQL Injection Attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of ransomware in cybersecurity?

Exfiltrates sensitive user data

Utilizes cryptographic algorithms to encrypt files and extorts a ransom for decryption keys

Propagates through network vulnerabilities

Obfuscates its presence by masquerading as legitimate applications

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?