Search Header Logo

Cybersecurity Threats Quiz

Authored by Kyle Concevido

Other

Professional Development

Used 1+ times

Cybersecurity Threats Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

98 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hospital employee receives an email claiming to be from IT, asking them to verify login credentials through a link. What kind of threat does this represent?

System configuration error

Credential stuffing

Phishing attack

Firewall misconfiguration

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During a cyber audit, a company finds that many employees use the same password across systems. What vulnerability does this highlight?

Cross-platform integration

Human error

Encryption protocol weakness

Database overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user downloads a free mobile app that silently records keystrokes. What type of malware is this?

Rootkit

Adware

Keylogger

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After opening a suspicious attachment, an employee finds all files on their PC encrypted, with a ransom note demanding cryptocurrency. What is this attack known as?

Phishing

Trojan

Ransomware

Data interception

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A government database is breached through an outdated system that had not been patched in years. What was the most likely root cause?

Insider sabotage

Misconfigured DNS

Unpatched vulnerability

Power outage

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A cybercriminal intercepts data sent between two parties without them noticing. What type of attack is this?

Replay attack

DDoS

MITM (Man-in-the-Middle)

Brute-force attack

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A disgruntled ex-employee remotely accesses internal systems using valid credentials that were never revoked. Which threat category does this fall under?

Script kiddie

Insider threat

Social engineering

Physical intrusion

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?