Lesson 02: Understanding Cyber Security Threats

Lesson 02: Understanding Cyber Security Threats

University

25 Qs

quiz-placeholder

Similar activities

Perangkat Lunak Utilitas

Perangkat Lunak Utilitas

12th Grade - University

20 Qs

Cybercrime Tools and Techniques

Cybercrime Tools and Techniques

University

29 Qs

Understanding Cyber Crimes

Understanding Cyber Crimes

University

23 Qs

Periodic Written Test - Computer

Periodic Written Test - Computer

9th Grade - University

20 Qs

Serangan Jaringan 2

Serangan Jaringan 2

12th Grade - University

26 Qs

STS GENAP INFORMATIKA 9

STS GENAP INFORMATIKA 9

9th Grade - University

28 Qs

Quiz Pengetahuan Umum

Quiz Pengetahuan Umum

7th Grade - University

30 Qs

Introducción a Linux

Introducción a Linux

University

20 Qs

Lesson 02: Understanding Cyber Security Threats

Lesson 02: Understanding Cyber Security Threats

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

EDWIN GARCIA

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware is designed to encrypt files and demand payment for decryption?

trojan horse

ransomware

adware

spyware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common social engineering technique?

Vishing

Spoofing

Shoulder Surfing

Phishing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a Denial of Service (DoS) attack aim to achieve?

To provide additional resources to a service.

To disrupt the normal functioning of a targeted system or service.

To steal sensitive information from a user.

To enhance the performance of a targeted system.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a Man-in-the-Middle (MITM) attack, what is the attacker trying to do?

The attacker is trying to establish a secure connection between two parties.

The attacker is trying to steal the identity of one of the parties.

The attacker is trying to intercept and manipulate communication between two parties.

The attacker is trying to enhance the communication speed between two parties.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is often disguised as legitimate software?

Trojan horse

Ransomware

Virus

Worm

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary goal of ransomware?

To extort money from victims.

To protect data from unauthorized access.

To improve system performance.

To delete files permanently.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware?

Trojan

Firewall

Spyware

Antivirus

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?