Non-fraudulent vs. Fraudulent Threats ( GROUP 6 )

Non-fraudulent vs. Fraudulent Threats ( GROUP 6 )

University

15 Qs

quiz-placeholder

Similar activities

IS Quiz

IS Quiz

University

10 Qs

PW_IoT_Quiz_3

PW_IoT_Quiz_3

University

16 Qs

IoT in Modern Agriculture Quiz

IoT in Modern Agriculture Quiz

University

20 Qs

Internet of Things, Big Data, Cloud Computing

Internet of Things, Big Data, Cloud Computing

University

10 Qs

Information Technology Quiz

Information Technology Quiz

University

20 Qs

FHCT1012 Computing Technology Sample MIdterm questions

FHCT1012 Computing Technology Sample MIdterm questions

University

15 Qs

Quiz FinTech 10

Quiz FinTech 10

University

10 Qs

ICYS5112 LU1 Quiz

ICYS5112 LU1 Quiz

University

15 Qs

Non-fraudulent vs. Fraudulent Threats ( GROUP 6 )

Non-fraudulent vs. Fraudulent Threats ( GROUP 6 )

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Mark Feguro

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary origin of non-fraudulent threats?

Phishing attempts via SMS

Malware-laden applications

Deliberate attacks for financial gain

Mistakes or technical shortcomings

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a fraudulent threat in IoT?

Using factory default passwords because the user didn't change them

Lack of firmware updates due to device limitations

Botnet formation using default credentials to launch DDoS attacks

Using unencrypted communication protocols like Telnet

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to the presentation, why are IoT and mobile devices particularly vulnerable?

They have high computing power that attracts attackers.

They often struggle to support strong authentication and encryption

They are not multiplying rapidly.

They do not process sensitive personal data.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "Smishing" refer to?

Disguised apps that inject malware

Spyware that captures user activity

Phishing via SMS to trick users into revealing credentials

Hijacking devices to demand a ransom

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is considered a non-fraudulent threat for mobile devices?

Spyware and keyloggers

Excessive app permissions leading to unintentional data leakage

Malicious APKs

Vishing

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key reason for the expanding cyber-attack surface?

A decline in data sensitivity.

The decrease in the number of smart appliances.

The use of strong encryption on all devices.

The rapid multiplication of IoT and mobile endpoints

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Mirai and Mozi botnets are examples of what kind of threat?

Non-fraudulent IoT threats

Fraudulent mobile threats

Non-fraudulent mobile threats

Fraudulent IoT threats

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Information Technology (IT)