Online Threats: CyberSecurity Quiz!

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Caelix
C
Caelix
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,262
| Attempts: 1,262 | Questions: 10
Please wait...
Question 1 / 10
0 %
0/100
Score 0/100
1. Hacking is the process by which cybercriminals gain access to your computer.

Explanation

Hacking is indeed the process by which cybercriminals gain unauthorized access to a computer system. It involves exploiting vulnerabilities in the system's security measures to gain control or extract sensitive information. Hackers can use various techniques and tools to carry out their attacks, such as malware, phishing, or brute-force attacks. Therefore, the statement "Hacking is the process by which cybercriminals gain access to your computer" is true.

Submit
Please wait...
About This Quiz
Online Threats: Cybersecurity Quiz! - Quiz

Explore key cybersecurity concepts in the 'Online Threats: Cybersecurity Quiz!' Learn about malware, pharming, spoofing, keyloggers, and more. Assess your understanding of how to protect against cyber threats... see moreeffectively. see less

2. ____________ a malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.

Explanation

Malware refers to a range of malicious software that can infect computers, including viruses, worms, Trojan horses, spyware, and adware. These programs are designed to harm or exploit computer systems, steal sensitive information, or disrupt normal operations. They can be spread through various means, such as email attachments, infected websites, or removable media. Malware can cause significant damage to a computer system, compromising its security and performance. It is important to have effective antivirus and security measures in place to protect against malware threats.

Submit
3. A website or email address that is created to look like it comes from a legitimate source. An email address may even include your own name, or the name of someone you know, making it difficult to discern whether or not the sender is real.

Explanation

Spoofing refers to the act of creating a website or email address that appears to be from a trustworthy source, but is actually fake. The sender may use familiar names or addresses to deceive the recipient into thinking that the communication is legitimate. This can make it challenging for the recipient to determine whether the sender is genuine or not.

Submit
4. Spyware is software that is installed on a computing device with the end user's knowledge.

Explanation

without the end users kwonloegde

Submit
5. Virtual "listening in" on information that's shared over an insecure (not encrypted) WiFi network.

Explanation

Wi-Fi eavesdropping refers to the act of intercepting and listening to information being transmitted over a Wi-Fi network without authorization. This can occur when the network is not encrypted, making it vulnerable to unauthorized access. Eavesdroppers can capture and potentially exploit sensitive information shared over the network, such as passwords, financial data, or personal communications. Therefore, Wi-Fi eavesdropping is a significant security concern, highlighting the importance of using encryption protocols like WPA2 to protect wireless networks from such attacks.

Submit
6. _____ is a cyber attack intended to redirect a website's traffic to another, fake site. 

Explanation

Pharming is a type of cyber attack where hackers manipulate the DNS (Domain Name System) to redirect website traffic to a fake site. This fake site is designed to mimic the original website, tricking users into entering sensitive information such as login credentials or financial details. Unlike phishing, where users are lured to the fake site through deceptive emails or messages, pharming directly redirects users to the malicious site without their knowledge or consent. This attack can be carried out by exploiting vulnerabilities in DNS servers or by infecting users' computers with malware that alters their DNS settings.

Submit
7. A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.

Explanation

Pharming is the correct answer because it involves redirecting users to a malicious and fake website, even if they enter the correct URL. This technique is often used by cybercriminals to deceive users and steal their personal information, such as login credentials or financial details. Unlike phishing, which relies on tricking users into clicking on a fraudulent link, pharming directly manipulates the DNS (Domain Name System) to redirect legitimate traffic to a fake website. This makes it harder for users to detect the scam, as they are not redirected through a suspicious link.

Submit
8. _____ is a collection of internet-connected devices, which may include PCs, servers, mobile devices, and the internet of things devices that are infected and controlled by a common type of malware.

Explanation

A botnet is a network of compromised devices, such as computers, servers, and mobile devices, that have been infected with malware and are under the control of a single entity. These infected devices, also known as bots, can be used by cybercriminals to carry out various malicious activities, such as launching distributed denial-of-service (DDoS) attacks, sending spam emails, stealing sensitive information, or spreading more malware. The common characteristic of a botnet is that it is a collection of internet-connected devices that have been hijacked by malware and are being controlled remotely by a malicious actor.

Submit
9. _____ can record instant messages, email, and capture any information you type at any time using your keyboard, including usernames, passwords, and other personally identifiable information(PII).

Explanation

A keylogger is a type of software or hardware device that can record and monitor keystrokes made on a computer or mobile device. It can capture all typed information, including instant messages, emails, usernames, passwords, and other personally identifiable information (PII). This allows unauthorized individuals to gain access to sensitive data without the user's knowledge or consent.

Submit
10. Worm is an executable file that will install itself and run automatically once it's downloaded.

Explanation

Trojan Horse

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 18, 2018
    Quiz Created by
    Caelix
Cancel
  • All
    All (10)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Hacking is the process by which cybercriminals gain access to your...
____________ a malicious software that infects your computer, such as...
A website or email address that is created to look like it comes from...
Spyware is software that is installed on a computing device with...
Virtual "listening in" on information that's shared over an...
_____ is a cyber attack intended to redirect a website's...
A means to point you to a malicious and illegitimate website by...
_____ is a collection of internet-connected devices, which may...
_____ can record instant messages, email, and capture any information...
Worm is an executable file that will install itself and run...
Alert!

Advertisement