Cybersecurity Attacks Quiz

Cybersecurity Attacks Quiz

University

19 Qs

quiz-placeholder

Similar activities

AISB223 Chapter 12: Confidentiality and Privacy Controls

AISB223 Chapter 12: Confidentiality and Privacy Controls

University

20 Qs

NISS-DC-Quiz

NISS-DC-Quiz

University

15 Qs

Q6. Cybersecurity Best Practices

Q6. Cybersecurity Best Practices

University

15 Qs

cybersecurity-common security infrastructure security

cybersecurity-common security infrastructure security

University

15 Qs

Security Fundamental

Security Fundamental

University

20 Qs

Network Protocols Quiz

Network Protocols Quiz

University

14 Qs

Cybersecurity Attacks Quiz

Cybersecurity Attacks Quiz

Assessment

Quiz

Information Technology (IT)

University

Easy

Created by

Mark Feguro

Used 6+ times

FREE Resource

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is an attack in the context of cybersecurity?

An attempt to destroy or alter an asset

A method of securing data

A type of software

A network protocol

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What distinguishes an active attack from a passive attack?

Passive attacks are illegal; active attacks are legal

Active attacks modify data; passive attacks do not

Active attacks are less harmful than passive attacks

Active attacks are easier to detect than passive attacks

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a Man-In-The-Middle (MITM) attack?

An attack where the attacker relays communication between two parties

An attack that uses brute force to guess passwords

An attack that involves social engineering

An attack that targets network hardware

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a brute-force attack?

An attempt to guess passwords by trying many combinations

An attack that uses social engineering techniques

An attack that involves altering data

An attack that targets network infrastructure

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the primary goal of a Smurf attack?

To render computer networks inoperable

To steal sensitive information

To gain unauthorized access to a system

To modify data in transit

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What protocol does a Fraggle attack use?

HTTP

TCP

ICMP

UDP

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a dictionary attack?

An attack that targets network hardware

An attack that modifies data

An attack that uses social engineering

An attack that tries all dictionary words as passwords

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)