3.3: What Type of Attack? Cyber Threats

3.3: What Type of Attack? Cyber Threats

6th - 8th Grade

12 Qs

quiz-placeholder

Similar activities

Tema 01: Introducción a la enseñanza con dispositivos móviles

Tema 01: Introducción a la enseñanza con dispositivos móviles

8th Grade - Professional Development

10 Qs

Engineering Design Process

Engineering Design Process

6th - 8th Grade

12 Qs

10 Claves para navegar seguro en internet

10 Claves para navegar seguro en internet

6th - 11th Grade

10 Qs

Digital Media and Your Brain

Digital Media and Your Brain

6th Grade

12 Qs

Precision and accuracy IED

Precision and accuracy IED

3rd - 12th Grade

10 Qs

Google Apps

Google Apps

1st - 9th Grade

9 Qs

Copyright

Copyright

6th - 8th Grade

15 Qs

tik tok

tik tok

6th Grade - University

10 Qs

3.3: What Type of Attack? Cyber Threats

3.3: What Type of Attack? Cyber Threats

Assessment

Quiz

Instructional Technology

6th - 8th Grade

Hard

Created by

Joseph Ferraro

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker impersonates a high-ranking executive, such as the CEO, and emails a finance department employee, instructing them to urgently transfer a large sum of money to an external account. The email is crafted to look legitimate and create a sense of urgency, leading the employee to bypass normal verification procedures.

phishing

malware

ransomware

social engineering

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A ransomware worm that spread rapidly in 2017, encrypting hundreds of thousands of computers worldwide. It exploited a vulnerability in Microsoft Windows.

phishing

malware

ransomware

social engineering

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Colonial Pipeline, a major US fuel pipeline, was shut down due to an attack. The attackers, DarkSide, demanded and received a ransom payment.

phishing

malware

ransomware

social engineering

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user receives an email that appears to be from their bank, warning of suspicious activity on their account. The email contains a link to a fake website that looks identical to the bank's site, where the user is prompted to enter their login credentials. The attacker then steals this information.

phishing

malware

ransomware

social engineering

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An email claims a package could not be delivered and asks the recipient to click a link to update their address. The link leads to a malicious website that installs malware.

phishing

malware

ransomware

social engineering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attacker leaves a USB drive labeled 'Confidential HR Files' in a common area. A curious employee plugs the drive into their computer, unwittingly installing malware.

phishing

malware

ransomware

social engineering

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A sophisticated computer worm discovered in 2010 that targeted Iran's nuclear facilities. It damaged centrifuges and disrupted the country's nuclear program.

phishing

malware

ransomware

social engineering

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?