Search Header Logo

3.3: What Type of Attack? Cyber Threats

Authored by Joseph Ferraro

Instructional Technology

6th - 8th Grade

3.3: What Type of Attack? Cyber Threats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker impersonates a high-ranking executive, such as the CEO, and emails a finance department employee, instructing them to urgently transfer a large sum of money to an external account. The email is crafted to look legitimate and create a sense of urgency, leading the employee to bypass normal verification procedures.

phishing

malware

ransomware

social engineering

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ransomware worm that spread rapidly in 2017, encrypting hundreds of thousands of computers worldwide. It exploited a vulnerability in Microsoft Windows.

phishing

malware

ransomware

social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Colonial Pipeline, a major US fuel pipeline, was shut down due to an attack. The attackers, DarkSide, demanded and received a ransom payment.

phishing

malware

ransomware

social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives an email that appears to be from their bank, warning of suspicious activity on their account. The email contains a link to a fake website that looks identical to the bank's site, where the user is prompted to enter their login credentials. The attacker then steals this information.

phishing

malware

ransomware

social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An email claims a package could not be delivered and asks the recipient to click a link to update their address. The link leads to a malicious website that installs malware.

phishing

malware

ransomware

social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker leaves a USB drive labeled 'Confidential HR Files' in a common area. A curious employee plugs the drive into their computer, unwittingly installing malware.

phishing

malware

ransomware

social engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A sophisticated computer worm discovered in 2010 that targeted Iran's nuclear facilities. It damaged centrifuges and disrupted the country's nuclear program.

phishing

malware

ransomware

social engineering

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?