
Top 16 Cyber threats 2025
Quiz
•
Computers
•
11th Grade
•
Practice Problem
•
Easy
Stephanie Cooke
Used 2+ times
FREE Resource
Enhance your content in a minute
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is social engineering?
Tricking people into revealing sensitive information (e.g. phishing, spoofing, baiting, whaling).
Using software to automate attacks.
Hiding data inside normal internet traffic.
Malware that locks files until a ransom is paid.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is third-party exposure?
Errors such as weak passwords.
Hackers target less secure partner companies to reach larger businesses.
Hiding malicious data inside normal internet traffic.
An employee causing harm intentionally.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are configuration mistakes?
Automating attacks using AI.
Errors such as weak passwords, not updating software, or poorly configured firewalls.
Hiding data inside internet traffic.
Malware disguised as safe downloads.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How is AI used in cyberattacks?
To create realistic phishing scams and find weak spots.
To lock files until a ransom is paid.
To disguise malware as safe programmes.
To hide data inside normal internet traffic.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is DNS tunnelling?
Tricking people into revealing information.
Hiding malicious data inside normal internet traffic so it sneaks past firewalls.
An employee causing harm intentionally.
Malware that locks files until a ransom is paid.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a drive-by attack?
Malware that automatically downloads when visiting a compromised site.
A phishing attack through email.
A type of ransomware that encrypts files.
A denial-of-service attack on a server.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is poor cyber hygiene?
Using strong passwords and multi-factor authentication.
Regularly updating software and using secure WiFi.
Bad habits like weak passwords, no updates, unsafe WiFi, or not using multi-factor authentication.
Encrypting all sensitive data.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
15 questions
J808 LO1 and LO2 planning project keywords / terms
Quiz
•
9th - 11th Grade
10 questions
INTERNET AND INTRANET
Quiz
•
9th - 11th Grade
17 questions
Email Lớp 6
Quiz
•
6th Grade - University
11 questions
BTEC DIT C3 B1 - Threats to Data
Quiz
•
11th Grade
10 questions
1.1 - System Architecture - CPU [OCR] [GCSE]
Quiz
•
9th - 12th Grade
16 questions
P0-pengenalan komponen komputer
Quiz
•
9th - 12th Grade
10 questions
KRIPTOGRAFI DALAM PENGKOMPUTERAN
Quiz
•
10th - 12th Grade
12 questions
ICT Computer Basics pt1
Quiz
•
10th - 12th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
Discover more resources for Computers
26 questions
Christmas Movie Trivia
Lesson
•
8th Grade - Professio...
15 questions
Christmas Song Emoji Pictionary
Quiz
•
7th - 12th Grade
20 questions
Christmas Movies
Quiz
•
1st - 12th Grade
20 questions
Christmas Movie Trivia
Quiz
•
9th - 12th Grade
29 questions
christmas facts
Lesson
•
5th - 12th Grade
20 questions
Christmas Trivia
Quiz
•
5th - 12th Grade
20 questions
Stages of Meiosis
Quiz
•
9th - 12th Grade
20 questions
christmas songs
Quiz
•
KG - University
