Cybersecurity Threats Quiz

Cybersecurity Threats Quiz

Professional Development

98 Qs

quiz-placeholder

Similar activities

SKB Farmasi

SKB Farmasi

Professional Development

100 Qs

Candidate New Driver (Rigid Truck)

Candidate New Driver (Rigid Truck)

Professional Development

95 Qs

PMP Question 100

PMP Question 100

Professional Development

100 Qs

Logical Reasoning Assessment - MEGATHIL

Logical Reasoning Assessment - MEGATHIL

Professional Development

101 Qs

Ký Sinh Trùng

Ký Sinh Trùng

University - Professional Development

100 Qs

TO SKD 1 LENGKAP

TO SKD 1 LENGKAP

Professional Development

100 Qs

SKB Satpol PP

SKB Satpol PP

KG - Professional Development

100 Qs

100 questions

100 questions

Professional Development

100 Qs

Cybersecurity Threats Quiz

Cybersecurity Threats Quiz

Assessment

Quiz

Other

Professional Development

Practice Problem

Easy

Created by

Kyle Concevido

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

98 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hospital employee receives an email claiming to be from IT, asking them to verify login credentials through a link. What kind of threat does this represent?

System configuration error

Credential stuffing

Phishing attack

Firewall misconfiguration

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cyber audit, a company finds that many employees use the same password across systems. What vulnerability does this highlight?

Cross-platform integration

Human error

Encryption protocol weakness

Database overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user downloads a free mobile app that silently records keystrokes. What type of malware is this?

Rootkit

Adware

Keylogger

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After opening a suspicious attachment, an employee finds all files on their PC encrypted, with a ransom note demanding cryptocurrency. What is this attack known as?

Phishing

Trojan

Ransomware

Data interception

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A government database is breached through an outdated system that had not been patched in years. What was the most likely root cause?

Insider sabotage

Misconfigured DNS

Unpatched vulnerability

Power outage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybercriminal intercepts data sent between two parties without them noticing. What type of attack is this?

Replay attack

DDoS

MITM (Man-in-the-Middle)

Brute-force attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A disgruntled ex-employee remotely accesses internal systems using valid credentials that were never revoked. Which threat category does this fall under?

Script kiddie

Insider threat

Social engineering

Physical intrusion

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?