Cybersecurity Threats Quiz

Cybersecurity Threats Quiz

Professional Development

98 Qs

quiz-placeholder

Similar activities

Cyber Security Assessment for Bank Officials

Cyber Security Assessment for Bank Officials

Professional Development

100 Qs

Z3DXXX CDC Vol 2 Review Exercises

Z3DXXX CDC Vol 2 Review Exercises

Professional Development

100 Qs

Quantitative Aptitude Practice - VISTAS / MEGATHIL

Quantitative Aptitude Practice - VISTAS / MEGATHIL

Professional Development

101 Qs

Star Wars 101 - Ultimate Trivia

Star Wars 101 - Ultimate Trivia

KG - Professional Development

101 Qs

Car logos

Car logos

KG - Professional Development

93 Qs

California DMV Written Practice Test #8 Signs 100 questions

California DMV Written Practice Test #8 Signs 100 questions

Professional Development

100 Qs

Suki's Kimono

Suki's Kimono

Professional Development

99 Qs

Hitha C Quiz 1 Continue

Hitha C Quiz 1 Continue

Professional Development

99 Qs

Cybersecurity Threats Quiz

Cybersecurity Threats Quiz

Assessment

Quiz

Other

Professional Development

Easy

Created by

Kyle Concevido

Used 1+ times

FREE Resource

98 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hospital employee receives an email claiming to be from IT, asking them to verify login credentials through a link. What kind of threat does this represent?

System configuration error

Credential stuffing

Phishing attack

Firewall misconfiguration

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cyber audit, a company finds that many employees use the same password across systems. What vulnerability does this highlight?

Cross-platform integration

Human error

Encryption protocol weakness

Database overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user downloads a free mobile app that silently records keystrokes. What type of malware is this?

Rootkit

Adware

Keylogger

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After opening a suspicious attachment, an employee finds all files on their PC encrypted, with a ransom note demanding cryptocurrency. What is this attack known as?

Phishing

Trojan

Ransomware

Data interception

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A government database is breached through an outdated system that had not been patched in years. What was the most likely root cause?

Insider sabotage

Misconfigured DNS

Unpatched vulnerability

Power outage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybercriminal intercepts data sent between two parties without them noticing. What type of attack is this?

Replay attack

DDoS

MITM (Man-in-the-Middle)

Brute-force attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A disgruntled ex-employee remotely accesses internal systems using valid credentials that were never revoked. Which threat category does this fall under?

Script kiddie

Insider threat

Social engineering

Physical intrusion

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?