This is the second quiz about the threats to systems, data & information subtopic. All 15 questions in this quiz are covered in the articles.
Every question in this quiz is multiple choice. In order to take this quiz, click on the box for your selected answer. Once you have tried your best attempt, you can click on the 'Submit answers' button and your answers will be marked. The questions highlighted in green are the ones you answered correctly and the questions highlighted in red are the ones you answered incorrectly. This will give you an overview of the terminology that you can remember and the terminology that you could not remember. You could also consider whether the questions you answered correctly were ones you definitely thought you knew or ones you guessed. If you want to have another go at the quiz, you can reload the page.
Once you've finished the quiz, you can click on 'Reveal/Hide answers' to reveal or hide the correct answers for every question. The correct answer is explained for most questions.
Remember to click on 'Submit answers' once you have finished this quiz in order to get your result.
Question 1
The correct answer is: a: A small business
Small businesses are at a higher risk of a cyberattack because they usually have fewer resources and assets to deal with cyberattacks.
Question 2
The correct answer is: c: Spyware
keylogger is a type of spyware that records all keystrokes the user makes and sends that data to a third party. Keyloggers can record sensitive information, like usernames, passwords and bank details.
Question 3
The correct answer is: d: Firewall
A firewall is a type of computer network security system that restricts internet traffic entering, leaving, and within a private network, not a type of malware.
Options A, B, and C are all examples of malware.
Question 4
The correct answer is: d: Launching a DDoS attack against a specific web server.
With a targeted cyberattack, attackers are launching a cyberattack against a specific individual or organisation. An example of this is launching a DDoS attack against a specific web server to bring it down or make it unresponsive.
Options A, B, and C are examples of untargeted cyberattacks.
Question 5
The correct answer is: b: Ransomware
Ransomware is a type of malware that blocks access to a computer system or files until a sum of money is paid. Ransomware may encrypt your personal files so that they are inaccessible or even completely lock you out of your computer.
Question 6
The correct answer is: b: False
A Trojan horse is a type of malware. It is not a virus because a virus is self-replicating, meaning that it copies itself to spread from one computer to another. A Trojan horse is not self-replicating since it require users to manually download and install it to become infected. Trojan horses don't spread by themselves. Therefore, it is incorrect to say 'Trojan horse virus' or 'Trojan virus'.
Question 7
The correct answer is: a: Attempting the same username and password combination on other websites after an account has been compromised.
This happens after a user account has been compromised and the attacker tries the username and password combination on other websites, particularly very high-traffic well-established sites, in the hope of correctly guessing it. Attackers often collect lists of stolen credentials that were exposed in previous data breaches. Credential stuffing is a reason why it is not recommended to reuse passwords across multiple accounts.
Question 8
The correct answer is: d: All of the above
Options A, B, and C can all minimise the risks of cybercrime.
Question 9
The correct answer is: a: Physically control the keyboard and mouse.
Unauthorised access does not allow hackers to physically control hardware devices.
Options B, C, and D are all examples of things that a hacker can do once they have gained unauthorised access to an electronic account.
Question 10
The correct answer is: b: Unexpected redirects to scam sites or sites filled with ads.
Options A, C, and D are incorrect as they are browser features, not signs of a browser hijacker.
Question 11
The correct answer is: c: It can leave systems vulnerable to security holes.
Riskware describes software that is not strictly malicious, but poses potential security risks due to software incompatibilities, security holes, or legal violations. Riskware is not a type of malware. It is a risky type of software that has the possibility of becoming a threat to a computer and is often downloaded and installed without the user realising that it poses a risk in some way.
Question 12
The correct answer is: d: Exploiting vulnerabilities in telephone systems to gain unauthorised access to restricted telephone services or areas.
Phreaking is the act of exploiting vulnerabilities in telephone systems to gain unauthorised access to restricted telephone services or areas, often to obtain free phone calls, bypass calling restrictions, have calls charged to someone else's account, and even take control of entire telephone networks.
Question 13
The correct answer is: d: All of the above
Options A, B, and C are all examples of ways that viruses and malware spread.
Question 14
The correct answer is: b: No major antiviruses detect it as malicious.
Question 15
The correct answer is: c: Scareware
Rogue security software is a type of scareware that tricks users into thinking they have viruses or malware on their computers when they actually don't and misleads them with fake detections and alerts.
Your like or dislike has been added successfully. To see the changes, reload the page.