This is the third quiz about the threats to systems, data & information subtopic. All 15 questions in this quiz are covered in the articles.
Every question in this quiz is multiple choice. In order to take this quiz, click on the box for your selected answer. Once you have tried your best attempt, you can click on the 'Submit answers' button and your answers will be marked. The questions highlighted in green are the ones you answered correctly and the questions highlighted in red are the ones you answered incorrectly. This will give you an overview of the terminology that you can remember and the terminology that you could not remember. You could also consider whether the questions you answered correctly were ones you definitely thought you knew or ones you guessed. If you want to have another go at the quiz, you can reload the page.
Once you've finished the quiz, you can click on 'Reveal/Hide answers' to reveal or hide the correct answers for every question. The correct answer is explained for most questions.
Remember to click on 'Submit answers' once you have finished this quiz in order to get your result.
Question 1
The correct answer is: d: Change any compromised passwords
Simon should get as many details of the attack as he can recall and change the compromised passwords on any accounts that he has shared with the phisher as soon as possible.
Options A, B, and C are incorrect as they will not do anything to limit the damage.
Question 2
The correct answer is: b: They are likely to experience negative emotional responses.
Cyberbullying is a serious matter and people who have been bullied online may feel hurt and experience lower self-esteem as well as negative emotional responses, including getting angry and anxious.
Question 3
The correct answer is: d: All of the above
Options A, B, and C are all examples of ways to protect against technical support scams.
Question 4
The correct answer is: c: You pay a trusted professional to troubleshoot issues that are preventing your computer from starting up and the professional tells you that you need to uninstall conflicting drivers.
This is not an example of a technical support scam as it is solicited and involves paying someone to troubleshoot issues. Options A, B, and D are all examples of technical support scams.
Question 5
The correct answer is: b: False
This statement is false. Catfishing is not a type of phishing attack. It involves pretending to be someone you are not to deceive other people.
Question 6
The correct answer is: a: You receive an email claiming that the sender will give away money to anyone who forwards the email.
Chain emails are designed to get the recipient to forward the email to other people to spread as many copies of the message as possible.
Options B, C, and D are not examples of chain emails.
Question 7
The correct answer is: a: Ignore it and delete it from your inbox
Chain emails often come with privacy and security risks, so ignoring them and deleting them from your inbox is the recommended action to take.
Question 8
The correct answer is: c: Social engineering
Social engineering is the use of deception tactics to get a user to give away their sensitive information, like usernames, passwords, and bank details, which may be used for fraudulent purposes.
Question 9
The correct answer is: c: Phishing is untargeted, whilst spear phishing is targeted towards an individual.
Question 10
The correct answer is: a: Phishing without a lure
Question 11
The correct answer is: b: Using an intrusion prevention system (IPS)
An intrusion prevention system (IPS), also known as an intrusion detection prevention system is a security system that protects an organisation's network from malicious activity. It works by logging and monitoring all network traffic and watching for malicious activity. When malicious activity is detected, it will block and prevent the threats. Examples of threats that an IPS can detect include DDoS attacks, viruses, worms, and other exploits.
Options A, C, and D are incorrect as these do not do anything to protect against DDoS attacks.
Question 12
The correct answer is: b: Users in general
Question 13
The correct answer is: d: On a content delivery network (CDN)
Options A, B, and C are all examples of places where cyberbullying can happen.
Question 14
The correct answer is: b: Ignoring and limiting contact with them.
Internet trolls very often want attention, so it is best to ignore and limit contact with people that intentionally cause disruption, encouraging them to move on. Even though defending or standing up for yourself can make you feel better for a few minutes, it is a bad idea as it brings even more attention to the situation and could lead to long arguments.
Question 15
The correct answer is: a: True
This statement is true. Taking degrading photos of someone else and then posting them online without permission is an example of cyberbullying.
Your like or dislike has been added successfully. To see the changes, reload the page.