
Non-fraudulent vs. Fraudulent Threats ( GROUP 6 )

Quiz
•
Information Technology (IT)
•
University
•
Medium
Mark Feguro
Used 1+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary origin of non-fraudulent threats?
Phishing attempts via SMS
Malware-laden applications
Deliberate attacks for financial gain
Mistakes or technical shortcomings
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of a fraudulent threat in IoT?
Using factory default passwords because the user didn't change them
Lack of firmware updates due to device limitations
Botnet formation using default credentials to launch DDoS attacks
Using unencrypted communication protocols like Telnet
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to the presentation, why are IoT and mobile devices particularly vulnerable?
They have high computing power that attracts attackers.
They often struggle to support strong authentication and encryption
They are not multiplying rapidly.
They do not process sensitive personal data.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does "Smishing" refer to?
Disguised apps that inject malware
Spyware that captures user activity
Phishing via SMS to trick users into revealing credentials
Hijacking devices to demand a ransom
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is considered a non-fraudulent threat for mobile devices?
Spyware and keyloggers
Excessive app permissions leading to unintentional data leakage
Malicious APKs
Vishing
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a key reason for the expanding cyber-attack surface?
A decline in data sensitivity.
The decrease in the number of smart appliances.
The use of strong encryption on all devices.
The rapid multiplication of IoT and mobile endpoints
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Mirai and Mozi botnets are examples of what kind of threat?
Non-fraudulent IoT threats
Fraudulent mobile threats
Non-fraudulent mobile threats
Fraudulent IoT threats
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Ethical Hacking week #1

Quiz
•
University
10 questions
IS Quiz

Quiz
•
University
16 questions
PW_IoT_Quiz_3

Quiz
•
University
12 questions
Recap W02 - W04 Information and Communication Technology

Quiz
•
University
20 questions
Quiz Teknologi dan Profesi

Quiz
•
11th Grade - University
11 questions
QUIZ 3: SECURITY TOOLS and VULNERABILITY ANALYSIS

Quiz
•
University
10 questions
PT101: Quiz No. 1

Quiz
•
University
19 questions
Cybersecurity Fundamentals Theory Test 2

Quiz
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade