This is the first quiz about the threats to systems, data & information subtopic. All 15 questions in this quiz are covered in the articles.
Every question in this quiz is multiple choice. In order to take this quiz, click on the box for your selected answer. Once you have tried your best attempt, you can click on the 'Submit answers' button and your answers will be marked. The questions highlighted in green are the ones you answered correctly and the questions highlighted in red are the ones you answered incorrectly. This will give you an overview of the terminology that you can remember and the terminology that you could not remember. You could also consider whether the questions you answered correctly were ones you definitely thought you knew or ones you guessed. If you want to have another go at the quiz, you can reload the page.
Once you've finished the quiz, you can click on 'Reveal/Hide answers' to reveal or hide the correct answers for every question. The correct answer is explained for most questions.
Remember to click on 'Submit answers' once you have finished this quiz in order to get your result.
Question 1
The correct answer is: a: Phishing
Phishing is the practice of impersonating trusted companies to steal sensitive information from users.
Question 2
The correct answer is: c: Setting up a fake online profile to deceive other people.
Option A is incorrect as that describes phishing.
Option B is incorrect as that describes pharming.
Option D is incorrect as that describes a website blocking filter.
Question 3
The correct answer is: b: It will cause downtime, which will result in financial losses.
DDoS attacks are quite harmful, especially when they cause large websites to go down during high-traffic times. In addition, they put excessive loads on the servers and cause financial losses for businesses, particularly businesses that greatly rely on networks or servers.
Question 4
The correct answer is: c: An inability for a server to respond to requests for extended periods of time.
Question 5
The correct answer is: d: Constantly spreading false rumours about someone else on social media sites to spite them.
Options A and C are incorrect as these are examples of trolling.
Option B is incorrect as that is not an example of cyberbullying or misbehaving online. It is only an example of poor proofreading.
Question 6
The correct answer is: b: False
It is the other way round. Pharming is more harmful than phishing in that a lot of computers can be affected by it with no user interaction. For example, if a DNS server was compromised, users can still be affected by it even if their computer has no malware installed
Question 7
The correct answer is: a: It will result in unauthorised access to his electronic account, which could lead to data theft.
Question 8
The correct answer is: c: Using a privacy screen protector for devices.
A privacy screen protector is a sheet placed over your screen that will make it harder for anyone to see the screen from far away. You will be able to see your screen, but it will obscure the visibility of the display from anyone further away.
Question 9
The correct answer is: b: To spread as many copies as possible of the message.
Usually, the purpose of chain mail is to spread as many copies as possible of the message.
Options A, B, and C are incorrect. Although some chain emails are intended to do this, that is not the main purpose of all chain emails.
Question 10
The correct answer is: b: False
Spam is a form of unsolicited and unwanted online communication sent to an individual or a large number of individuals. It is not an example of social engineering as it does not use deception tactics to get a user to give away their sensitive information.
Question 11
The correct answer is: d: All of the above
All of the options above are ways to reduce the chances of getting spam.
Question 12
The correct answer is: a: Trolling
An internet troll is a person online who intentionally causes disruption by posting off-topic, upsetting, controversial, or disturbing content or messages in order to get a reaction out of people.
Question 13
The correct answer is: c: They use intentional false positives to convince users that their computers have problems.
A technical support scam, often abbreviated to a tech support scam, is a deceptive activity that uses intentional false positives to convince users that their computers have problems when they actually don't.
Option A is incorrect as technical support scams are not limited to specific countries. They have become a worldwide problem.
Option B is incorrect. Although some technical support scams come in the form of malware, users can also come across them through mistyping URLs, emails, and phone calls and they do not guarantee that computers have malware installed.
Option D is incorrect as technical support scams often scare users into installing unnecessary and potentially dangerous programs to fix a non-existent problem.
Question 14
The correct answer is: b: The website does not provide much information about what users will be purchasing.
This is a sign of a scam sites. Scam sites are often vague and don't provide much information about what users will be purchasing to reduce the chances of people detecting that it is a scam. Detailed information is also something that scam sites would not usually bother with and is a sign that it has been rushed to be launched. A legitimate site will explain in detail about what users will be purchasing.
Option A is incorrect as a website that has been around for years indicates that it is more likely to be legitimate and well-established.
Option C is incorrect as most websites make money from banner ads. Banner ads themselves do not mean that a website is less likely to be legitimate.
Option D is incorrect as that does not mean that a website is a scam. Not many visitors can just be a sign that a website is new and growing, so don't rely on website traffic itself to spot a scam.
Question 15
The correct answer is: d: Hacking
Hacking relies on technical knowledge of exploiting weaknesses in systems rather than deception tactics.
Options A, B, and C are all examples of social engineering techniques.
Your like or dislike has been added successfully. To see the changes, reload the page.