1) What is a vulnerability in information security? a) A security update b) A weakness to exploit c) A type of firewall d) A user manual 2) Which two major categories describe threat sources? a) Personal and public b) Hardware and software c) Adversarial and non-adversarial d) Federal and private 3) Which of the following is a non-adversarial threat source? a) Hacker b) Natural disaster c) Botnet operator d) Insider threat 4) What is a threat event? a) A training exercise b) A successful login c) An incident causing harm d) A patch installation 5) Which of the following is an adversarial threat? a) Accidental deletion b) Earthquake c) Employee sabotage d) Server overheating 6) Fraud is best defined as: a) Routine system testing b) A harmless prank c) A network configuration error d) An intentionally deceptive act 7) Who often commits fraud due to retained system knowledge? a) Former employees b) New customers c) Software vendors d) Internet providers 8) Which is considered a fraud technique? a) Changing Wi-Fi password b) Updating anti-virus c) Social engineering d) Restarting the system 9) Social engineering manipulates people to: a) Upgrade their devices b) Reveal confidential info c) Install security patches d) Avoid phishing emails 10) Advanced Persistent Threats (APTs) aim to: a) Overheat hardware b) Gain long-term access c) Improve system speed d) Send automatic updates 11) Insider threats often come from: a) Competitors b) Business partners c) Untrained customers d) Employees with access 12) Which is an insider sabotage action? a) Installing updates b) Destroying hardware/data c) Purchasing devices d) Increasing storage 13) Malicious hackers are individuals who: a) Legally maintain systems b) Accidentally delete files c) Illegally access systems d) Provide support 14) Attackers often hack systems because: a) Enjoy challenge/bragging b) Free cloud storage c) Complete assignments d) Need new jobs 15) Bot-network operators generally: a) Install security software b) Use infected systems c) Train cybersecurity teams d) Disable hacking tools 16) Criminal groups attack systems to: a) Improve productivity b) Conduct research c) Test new hardware d) Steal money/fraud 17) Foreign intelligence services use cyber tools for: a) Public entertainment b) Environmental research c) Espionage/information d) Updating software 18) Phishers try to: a) Backup data b) Trick users c) Install secure software d) Speed up browsing 19) Spammers usually send: a) Unsolicited emails b) Automatic updates c) Warranty confirmations d) Company reports 20) Cyber terrorists are motivated by: a) Political ideology b) Entertainment purposes c) Customer satisfaction d) Technical challenges 21) Industrial spies seek to: a) Reduce data storage b) Acquire IP secretly c) Create social media d) Clean systems 22) What does a computer virus do? a) Repairs files b) Attaches and replicates c) Installs hardware d) Cleans drives 23) A Trojan horse typically spreads by: a) Pre-installed by manufacturers b) Appearing as legitimate file c) Updating OS d) Included in warranties 24) What makes a worm different from a virus? a) Requires permission b) Replicates across networks c) Cannot spread d) Infects mobile only 25) Why are rootkits considered dangerous? a) Improve speed b) Easy to uninstall c) Hide and allow control d) Prevent infections 26) Spyware is designed to: a) Encrypt and demand payment b) Track and collect data c) Speed up internet d) Repair software 27) A logic bomb activates when: a) User prints document b) Website loads slowly c) Memory runs out d) Specific conditions occur 28) Ransomware: a) Locks files, demands payment b) Cleans malware c) Improves battery d) Affects printers 29) Which of the following increases the risk of ransomware? a) Reading textbooks b) Ignoring updates c) Using wired internet d) Buying hardware 30) Which cyber threat locks files and demands cryptocurrency as payment? a) Spyware b) Worm c) Ransomware d) Rootkit
0%
Cybersecurity Threats Quiz
共享
共享
共享
由
Academics2
编辑内容
打印
嵌入
更多
作业
排行榜
显示更多
显示更少
此排行榜当前是私人享有。单击
,共享
使其公开。
资源所有者已禁用此排行榜。
此排行榜被禁用,因为您的选择与资源所有者不同。
还原选项
随堂测验
是一个开放式模板。它不会为排行榜生成分数。
需要登录
视觉风格
字体
需要订阅
选项
AI增强版:本活动包含AI生成的内容。
了解更多信息。
切换模板
显示所有
播放活动时将显示更多格式。
打开成绩
复制链接
QR 代码
删除
恢复自动保存:
?