Attacks

Attacks

University

10 Qs

quiz-placeholder

Similar activities

PT101: Quiz No. 1

PT101: Quiz No. 1

University

10 Qs

REVIEW TIME

REVIEW TIME

9th Grade - University

10 Qs

Recap Handout 3 & 4

Recap Handout 3 & 4

6th Grade - University

15 Qs

Quiz #2

Quiz #2

University

15 Qs

Table,Image formatting

Table,Image formatting

5th Grade - University

15 Qs

QUIZ-1 KELAS XI

QUIZ-1 KELAS XI

University

10 Qs

Network Technology (BSIT 4)

Network Technology (BSIT 4)

University

12 Qs

2.2 Method of Data Transmission

2.2 Method of Data Transmission

University

13 Qs

Attacks

Attacks

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Usman Ali

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

An attacker gains access to a corporate network and, over several weeks, copies large amounts of research data. They are careful not to delete or modify any files, and they cover their tracks so system administrators don't notice any disruption.

Active and Unintentional

Passive and Unintentional

Active and Intentional

Passive and Intentional

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A cybercriminal group wants to disrupt the operations of a major national bank. They know the bank has strong defenses, so they launch a massive Distributed Denial of Service (DDoS) attack against the bank's internet service provider (ISP), causing outages for the bank and all other customers of that ISP.

From the bank's perspective, which term best describes this attack strategy?

Direct attack

An Indirect attack

A Passive attack

An Unintentional attack

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A rival company wants to take down a competitor's online store during a holiday sale. They execute a ransomware attack that encrypts all of the store's website files, replacing the homepage with a ransom note. This makes the site completely unusable.

Based on its effect on the online store's operations, this attack is best described as:

Passive

Indirect

Active

Unintentional

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

An office manager is responsible for decommissioning old computers. Following company policy, they attempt to wipe the hard drives before sending them to a recycler. However, the software they use fails silently, leaving all the sensitive company data intact on the drives.

Which term best classifies the manager's action that led to this potential data breach?

Intentional

Passive

Indirect

Unintentional

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A hacker sits in a coffee shop and uses sniffing software to monitor all the unencrypted Wi-Fi traffic. They are able to capture login credentials and personal messages from other customers without interfering with anyone's connection.

The hacker's monitoring of traffic, without altering it, is an example of what kind of attack?

An Active attack

A Passive attack

A Physical attack

An Unintentional attack

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A disgruntled employee plans to steal their company's confidential client list before they quit. On their last day, they log into the company's CRM system, download the client list to a USB drive, and delete the original files from the server to cause chaos.

How is this incident best classified in terms of action and intent?

Passive and Intentional

Active and Unintentional

Active and Intentional

Passive and Unintentional

7.

MULTIPLE SELECT QUESTION

3 mins • 1 pt

A user receives an email that appears to be from their bank, asking them to verify their account details due to a "security update." The user clicks the link, enters their username and password on a fake website, and the attacker immediately uses these credentials to access their real bank account.

How is this phishing attack best classified?

Indirect and Unintentional

Direct and Unintentional

Passive and Intentional

Direct and Intentional

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?