Lesson 02: Understanding Cyber Security Threats

Lesson 02: Understanding Cyber Security Threats

University

25 Qs

quiz-placeholder

Similar activities

quiziz 4 sumber media 2sda5

quiziz 4 sumber media 2sda5

University

20 Qs

Prototyping Model in SDLC Quiz -SLT

Prototyping Model in SDLC Quiz -SLT

University

20 Qs

HO - 31 Define la regresión lineal

HO - 31 Define la regresión lineal

University

20 Qs

Seguridad de Redes

Seguridad de Redes

University

20 Qs

Ktra thường xuyên Tin 11

Ktra thường xuyên Tin 11

11th Grade - University

20 Qs

IT for Managers M1

IT for Managers M1

University

20 Qs

Cloud Service Models & Software Process Models

Cloud Service Models & Software Process Models

2nd Grade - University

20 Qs

BÀI KIỂM TRA 15 PHÚT - Môn Tin Học 10 - HK2-PYTHON

BÀI KIỂM TRA 15 PHÚT - Môn Tin Học 10 - HK2-PYTHON

10th Grade - University

20 Qs

Lesson 02: Understanding Cyber Security Threats

Lesson 02: Understanding Cyber Security Threats

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

EDWIN GARCIA

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware is designed to encrypt files and demand payment for decryption?

trojan horse

ransomware

adware

spyware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common social engineering technique?

Vishing

Spoofing

Shoulder Surfing

Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a Denial of Service (DoS) attack aim to achieve?

To provide additional resources to a service.

To disrupt the normal functioning of a targeted system or service.

To steal sensitive information from a user.

To enhance the performance of a targeted system.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a Man-in-the-Middle (MITM) attack, what is the attacker trying to do?

The attacker is trying to establish a secure connection between two parties.

The attacker is trying to steal the identity of one of the parties.

The attacker is trying to intercept and manipulate communication between two parties.

The attacker is trying to enhance the communication speed between two parties.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is often disguised as legitimate software?

Trojan horse

Ransomware

Virus

Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of ransomware?

To extort money from victims.

To protect data from unauthorized access.

To improve system performance.

To delete files permanently.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware?

Trojan

Firewall

Spyware

Antivirus

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?