The Year in Hacks

Interactive Video
•
Business, Information Technology (IT), Architecture
•
University
•
Hard
Quizizz Content
FREE Resource
Read more
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is considered the technique of the year in cybersecurity?
Phishing
Ransomware
Insider Threats
Credential Stuffing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to have a non-technical plan for ransomware?
To manage business partnerships and communication
To reduce the cost of cybersecurity insurance
To ensure technical systems are updated
To increase the speed of data recovery
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What role does Bitcoin play in ransomware attacks?
It is used to track hackers
It is a tool for data backup
It is used to encrypt files
It is a common payment method for ransoms
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What was a key factor in the Capital One hack?
An insider threat
A DDoS attack
A phishing attack
A SQL injection
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is credential stuffing?
Sending fake emails to steal information
Using stolen credentials from one breach to access other accounts
Encrypting files and demanding a ransom
Overloading a server with traffic
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How did Fortnite encourage users to adopt multifactor authentication?
By sending reminders via email
By offering a discount on in-game purchases
By providing a gift box that must be given to a friend
By automatically enabling it for all users
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common tactic used in phishing attacks?
Sending emails that appear to be from legitimate sources
Using complex algorithms to encrypt data
Stealing physical devices
Overloading servers with traffic
Create a free account and access millions of resources
Similar Resources on Wayground
6 questions
Lookalike Letters Phishing Attacks

Interactive video
•
University
8 questions
Practical Cyber Hacking Skills for Beginners - Ransomware

Interactive video
•
University
8 questions
How to disable basic or legacy authentication to set up MFA in Office 365

Interactive video
•
University
6 questions
Trump Says He’ll Be Tough on Breaches After Tax Leak

Interactive video
•
University
5 questions
The Year in Hacks

Interactive video
•
University
8 questions
Microsoft Fires Back at Crowdstrike on Cybersecurity

Interactive video
•
University
6 questions
Rise of Ransomeware Reveals Cybersecurity Opportunities

Interactive video
•
University
6 questions
FBI Warns of 'Destructive Malware Attack

Interactive video
•
University
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade