Online Threats: CyberSecurity Quiz!

10 Questions | Total Attempts: 699

SettingsSettingsSettings
Online Threats: Cybersecurity Quiz! - Quiz

.


Questions and Answers
  • 1. 
    ____________ a malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.
  • 2. 
    A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.
    • A. 

      Phishing

    • B. 

      Pharming

    • C. 

      Ransomware

    • D. 

      Phlanting

  • 3. 
    A website or email address that is created to look like it comes from a legitimate source. An email address may even include your own name, or the name of someone you know, making it difficult to discern whether or not the sender is real.
    • A. 

      Spyware

    • B. 

      Spoofing

    • C. 

      Spam

    • D. 

      Wi-Fi Eavesdropping

  • 4. 
    Worm is an executable file that will install itself and run automatically once it's downloaded.
    • A. 

      True

    • B. 

      False

  • 5. 
    [Blank] can record instant messages, email, and capture any information you type at any time using your keyboard, including usernames, passwords, and other personally identifiable information(PII).
  • 6. 
    Virtual “listening in” on information that's shared over an insecure (not encrypted) WiFi network.
    • A. 

      WI-FI Master

    • B. 

      WPA2 Handshake Vulnerabilities

    • C. 

      Wi-Fi Eavesdropping

    • D. 

      Spyware

  • 7. 
    Spyware is software that is installed on a computing device with the end user's knowledge.
    • A. 

      True

    • B. 

      False

  • 8. 
    [Blank] is a collection of internet-connected devices, which may include PCs, servers, mobile devices, and the internet of things devices that are infected and controlled by a common type of malware.
  • 9. 
    [Blank] is a cyber attack intended to redirect a website's traffic to another, fake site. 
  • 10. 
    Hacking is the process by which cybercriminals gain access to your computer.
    • A. 

      True

    • B. 

      False