Cybersecurity Attacks Quiz

Cybersecurity Attacks Quiz

University

19 Qs

quiz-placeholder

Similar activities

POST-TEST

POST-TEST

University

15 Qs

Pra-UTS KASDD

Pra-UTS KASDD

University

15 Qs

Teknologi Jaringan Komputer dan Telekomunikasi

Teknologi Jaringan Komputer dan Telekomunikasi

10th Grade - University

20 Qs

Ulangan Harian 1

Ulangan Harian 1

9th Grade - University

15 Qs

Recap Handout 3 & 4

Recap Handout 3 & 4

6th Grade - University

15 Qs

Quiz #2

Quiz #2

University

15 Qs

Table,Image formatting

Table,Image formatting

5th Grade - University

15 Qs

Fundamentos de Bases de Datos

Fundamentos de Bases de Datos

10th Grade - University

15 Qs

Cybersecurity Attacks Quiz

Cybersecurity Attacks Quiz

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Easy

Created by

Mark Feguro

Used 8+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is an attack in the context of cybersecurity?

An attempt to destroy or alter an asset

A method of securing data

A type of software

A network protocol

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What distinguishes an active attack from a passive attack?

Passive attacks are illegal; active attacks are legal

Active attacks modify data; passive attacks do not

Active attacks are less harmful than passive attacks

Active attacks are easier to detect than passive attacks

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a Man-In-The-Middle (MITM) attack?

An attack where the attacker relays communication between two parties

An attack that uses brute force to guess passwords

An attack that involves social engineering

An attack that targets network hardware

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a brute-force attack?

An attempt to guess passwords by trying many combinations

An attack that uses social engineering techniques

An attack that involves altering data

An attack that targets network infrastructure

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary goal of a Smurf attack?

To render computer networks inoperable

To steal sensitive information

To gain unauthorized access to a system

To modify data in transit

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What protocol does a Fraggle attack use?

HTTP

TCP

ICMP

UDP

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a dictionary attack?

An attack that targets network hardware

An attack that modifies data

An attack that uses social engineering

An attack that tries all dictionary words as passwords

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?