1) What is a vulnerability in information security? a) A security update b) A weakness to exploit c) A type of firewall d) A user manual 2) Which two major categories describe threat sources? a) Personal and public b) Hardware and software c) Adversarial and non-adversarial d) Federal and private 3) Which of the following is a non-adversarial threat source? a) Hacker b) Natural disaster c) Botnet operator d) Insider threat 4) What is a threat event? a) A training exercise b) A successful login c) An incident causing harm d) A patch installation 5) Which of the following is an adversarial threat? a) Accidental deletion b) Earthquake c) Employee sabotage d) Server overheating 6) Fraud is best defined as: a) Routine system testing b) A harmless prank c) A network configuration error d) An intentionally deceptive act 7) Who often commits fraud due to retained system knowledge? a) Former employees b) New customers c) Software vendors d) Internet providers 8) Which is considered a fraud technique? a) Changing Wi-Fi password b) Updating anti-virus c) Social engineering d) Restarting the system 9) Social engineering manipulates people to: a) Upgrade their devices b) Reveal confidential info c) Install security patches d) Avoid phishing emails 10) Advanced Persistent Threats (APTs) aim to: a) Overheat hardware b) Gain long-term access c) Improve system speed d) Send automatic updates 11) Insider threats often come from: a) Competitors b) Business partners c) Untrained customers d) Employees with access 12) Which is an insider sabotage action? a) Installing updates b) Destroying hardware/data c) Purchasing devices d) Increasing storage 13) Malicious hackers are individuals who: a) Legally maintain systems b) Accidentally delete files c) Illegally access systems d) Provide support 14) Attackers often hack systems because: a) Enjoy challenge/bragging b) Free cloud storage c) Complete assignments d) Need new jobs 15) Bot-network operators generally: a) Install security software b) Use infected systems c) Train cybersecurity teams d) Disable hacking tools 16) Criminal groups attack systems to: a) Improve productivity b) Conduct research c) Test new hardware d) Steal money/fraud 17) Foreign intelligence services use cyber tools for: a) Public entertainment b) Environmental research c) Espionage/information d) Updating software 18) Phishers try to: a) Backup data b) Trick users c) Install secure software d) Speed up browsing 19) Spammers usually send: a) Unsolicited emails b) Automatic updates c) Warranty confirmations d) Company reports 20) Cyber terrorists are motivated by: a) Political ideology b) Entertainment purposes c) Customer satisfaction d) Technical challenges 21) Industrial spies seek to: a) Reduce data storage b) Acquire IP secretly c) Create social media d) Clean systems 22) What does a computer virus do? a) Repairs files b) Attaches and replicates c) Installs hardware d) Cleans drives 23) A Trojan horse typically spreads by: a) Pre-installed by manufacturers b) Appearing as legitimate file c) Updating OS d) Included in warranties 24) What makes a worm different from a virus? a) Requires permission b) Replicates across networks c) Cannot spread d) Infects mobile only 25) Why are rootkits considered dangerous? a) Improve speed b) Easy to uninstall c) Hide and allow control d) Prevent infections 26) Spyware is designed to: a) Encrypt and demand payment b) Track and collect data c) Speed up internet d) Repair software 27) A logic bomb activates when: a) User prints document b) Website loads slowly c) Memory runs out d) Specific conditions occur 28) Ransomware: a) Locks files, demands payment b) Cleans malware c) Improves battery d) Affects printers 29) Which of the following increases the risk of ransomware? a) Reading textbooks b) Ignoring updates c) Using wired internet d) Buying hardware 30) Which cyber threat locks files and demands cryptocurrency as payment? a) Spyware b) Worm c) Ransomware d) Rootkit

Cybersecurity Threats Quiz

Edetabel

Visuaalne stiil

Valikud

AI täiustatud: See tegevus sisaldab tehisintellekti poolt genereeritud sisu. Lisateave.

Vaheta malli

Kas taastada automaatselt salvestatud ?