1) What is a vulnerability in information security? a) A security update b) A weakness to exploit c) A type of firewall d) A user manual 2) Which two major categories describe threat sources? a) Personal and public b) Hardware and software c) Adversarial and non-adversarial d) Federal and private 3) Which of the following is a non-adversarial threat source? a) Hacker b) Natural disaster c) Botnet operator d) Insider threat 4) What is a threat event? a) A training exercise b) A successful login c) An incident causing harm d) A patch installation 5) Which of the following is an adversarial threat? a) Accidental deletion b) Earthquake c) Employee sabotage d) Server overheating 6) Fraud is best defined as: a) Routine system testing b) A harmless prank c) A network configuration error d) An intentionally deceptive act 7) Who often commits fraud due to retained system knowledge? a) Former employees b) New customers c) Software vendors d) Internet providers 8) Which is considered a fraud technique? a) Changing Wi-Fi password b) Updating anti-virus c) Social engineering d) Restarting the system 9) Social engineering manipulates people to: a) Upgrade their devices b) Reveal confidential info c) Install security patches d) Avoid phishing emails 10) Advanced Persistent Threats (APTs) aim to: a) Overheat hardware b) Gain long-term access c) Improve system speed d) Send automatic updates 11) Insider threats often come from: a) Competitors b) Business partners c) Untrained customers d) Employees with access 12) Which is an insider sabotage action? a) Installing updates b) Destroying hardware/data c) Purchasing devices d) Increasing storage 13) Malicious hackers are individuals who: a) Legally maintain systems b) Accidentally delete files c) Illegally access systems d) Provide support 14) Attackers often hack systems because: a) Enjoy challenge/bragging b) Free cloud storage c) Complete assignments d) Need new jobs 15) Bot-network operators generally: a) Install security software b) Use infected systems c) Train cybersecurity teams d) Disable hacking tools 16) Criminal groups attack systems to: a) Improve productivity b) Conduct research c) Test new hardware d) Steal money/fraud 17) Foreign intelligence services use cyber tools for: a) Public entertainment b) Environmental research c) Espionage/information d) Updating software 18) Phishers try to: a) Backup data b) Trick users c) Install secure software d) Speed up browsing 19) Spammers usually send: a) Unsolicited emails b) Automatic updates c) Warranty confirmations d) Company reports 20) Cyber terrorists are motivated by: a) Political ideology b) Entertainment purposes c) Customer satisfaction d) Technical challenges 21) Industrial spies seek to: a) Reduce data storage b) Acquire IP secretly c) Create social media d) Clean systems 22) What does a computer virus do? a) Repairs files b) Attaches and replicates c) Installs hardware d) Cleans drives 23) A Trojan horse typically spreads by: a) Pre-installed by manufacturers b) Appearing as legitimate file c) Updating OS d) Included in warranties 24) What makes a worm different from a virus? a) Requires permission b) Replicates across networks c) Cannot spread d) Infects mobile only 25) Why are rootkits considered dangerous? a) Improve speed b) Easy to uninstall c) Hide and allow control d) Prevent infections 26) Spyware is designed to: a) Encrypt and demand payment b) Track and collect data c) Speed up internet d) Repair software 27) A logic bomb activates when: a) User prints document b) Website loads slowly c) Memory runs out d) Specific conditions occur 28) Ransomware: a) Locks files, demands payment b) Cleans malware c) Improves battery d) Affects printers 29) Which of the following increases the risk of ransomware? a) Reading textbooks b) Ignoring updates c) Using wired internet d) Buying hardware 30) Which cyber threat locks files and demands cryptocurrency as payment? a) Spyware b) Worm c) Ransomware d) Rootkit
0%
Cybersecurity Threats Quiz
공유
공유
공유
만든이
Academics2
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
AI 강화: 이 활동에는 AI가 생성한 콘텐츠가 포함되어 있습니다.
더 알아보세요.
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?