1) What is an attack vector? a) The potential consequences if an attack succeeds b) The weakness in a system that can be exploited c) The method or pathway a hacker uses to gain access d) Software that protects your computer 2) Which of the following is a vulnerability? a) Malware on a system b) Weak or default passwords c) Denial of Service attack d) Data theft 3) What is a threat in cybersecurity? a) A method attackers use to enter a system b) Something that could cause harm to a system c) A software patch d) Encryption of data 4) Which of these is a risk? a) Unpatched software b) Malware infection c) Consequences of a threat exploiting a vulnerability d) Phishing email 5) A Denial of Service (DoS) attack targets: a) User passwords b) Network services to make them unavailable c) Printer connections d) Personal emails 6) Which of the following is an example of spyware? a) Software secretly recording keystrokes b) Printer driver c) Wi-Fi router d) Antivirus update 7) BYOD (Bring Your Own Device) policies can increase risk because: a) Personal devices may lack security controls b) Devices are always encrypted c) Staff forget passwords d) Wi-Fi becomes faster 8) Which scenario best illustrates the subtle difference between a vulnerability and a threat? a) Malware exists (threat) → Default passwords (vulnerability) b) Malware exists (vulnerability) → Default passwords (threat) c) Printer jam (threat) → Staff complaint (vulnerability) d) Slow Wi-Fi (risk) → Printer jam (vulnerability) 9) A shop’s POS terminals function normally, but remote access is enabled and software hasn’t been patched for months. Which combination of threat and hidden risk is correct? a) Malware exploitation → hidden theft of card data b) Slow transactions → staff complaints c) Printer failure → lost receipts d) Wi-Fi congestion → poor customer experience 10) A teacher’s personal phone connects to the college network. Later, internal files are accessed without permission. What subtle threat does this illustrate? a) Wi-Fi congestion b) Mobile device introducing malware or unauthorized access c) Printer malfunction d) Staff forgot password

Cybersecurity Threats

Leaderboard

Visual style

Options

Switch template

Continue editing: ?