Want to create interactive content? It’s easy in Genially!

Get started free

IT Security Quiz

Lando Villar Collaguazo

Created on October 10, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Christmas Spirit Test

Corporate Icebreaker

Retro Bits Quiz

Bomb Quiz

Witchcraft Quiz

Halloween Quiz

Day of the Dead Quiz

Transcript

Don't let Duckrime fall down!

Help Duckrime get safe from cybercriminals.

START

QUESTION 01 OF 15

Which tactic Social engineering attacks use?

Spiritual techniques

Psychological techniques

Physical Techniques

QUESTION 01 OF 15

RIGHT!

Social engineering attacks are performed on psychological techniques in order to gain an advantage over their victims using motivators like love, money, fear, and status.

NEXT QUESTION

QUESTION 02 OF 15

Which of these can be used as a vector for phishing attacks?

SMS

Emails

Both

QUESTION 02 OF 15

RIGHT!

Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.

NEXT QUESTION

QUESTION 03 OF 15

Malware is typically designed to:

Damage a computer, network or server

Improve data encryption

Fix software vulnerabilities

QUESTION 03 OF 15

RIGHT!

Malware is malicious software designed to damage computers, networks or servers. Examples: Viruses, Trojans, Worms or Ransomware.

NEXT QUESTION

QUESTION 04 OF 15

The main purpose of a DDoS (Denial-of-Service) attack is to:

flood servers

Block Malware

Protect user data

QUESTION 04 OF 15

RIGHT!

DDoS attacks flood servers or networks to disrupt business operations.

NEXT QUESTION

QUESTION 05 OF 15

What do MitM (Man-in-the-Middle) attacks want to intercept?

Malware downloads

Communications between two parties

Network hardware

QUESTION 05 OF 15

RIGHT!

MitM attacks intercept the communication in a third-party relationship. Using public Wi-Fi can compromised your data.

NEXT QUESTION

QUESTION 06 OF 15

SQL injection attacks insert malicious _______ into a vulnerable application.

SQL queries

Memes

Firewalls

QUESTION 06 OF 15

RIGHT!

Malicious SQL queries are inserted into a vulnerable application.

NEXT QUESTION

QUESTION 07 OF 15

Which tool is use in Brute Force attacks?

Password cracking tools

Web browsers

E-book readers

QUESTION 07 OF 15

RIGHT!

Malicious actors systematically try all possible combinations of usernames or passwords to guess login credentials or encryption keys.

NEXT QUESTION

QUESTION 08 OF 15

What makes Zero-Day exploits particularly dangerous?

They exploit unknown vulnerabilities

They require a password to attack

They are publicly announced

QUESTION 08 OF 15

RIGHT!

Bad actors exploit a previously unknown vulnerability.

NEXT QUESTION

QUESTION 09 OF 15

Who can be an Insider Threat?

Contractors

Both

Employees

QUESTION 09 OF 15

RIGHT!

Insider Threat are current employees, contractors or vendors that cause harm due to its negligent or intentionally.

NEXT QUESTION

QUESTION 10 OF 15

What is the purpose of Cryptojacking?

To mine cryptocurrencies

To hijack firewalls

To mine carbon

QUESTION 10 OF 15

RIGHT!

Cryptojacking attacks are an unauthorised use of computing resources to mine cryptocurrencies.

NEXT QUESTION

QUESTION 11 OF 15

Which of these attacks are in the category of Social Engineering attacks?

Phishing attacks

Both

Tailgating

QUESTION 11 OF 15

RIGHT!

Social Engineering attacks manipulate people psychologically to take advantage of them and perform cyberattacks.

NEXT QUESTION

QUESTION 12 OF 15

Which of them are purposes of Phishing attacks?

Download delicious files

Steal sensitive information

Both

QUESTION 12 OF 15

RIGHT!

Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.

NEXT QUESTION

QUESTION 13 OF 15

In a spoofing attack, what does a bad actor do?

Intercepts communications

Pretends to be a trusted origin

Floods server with malicious traffic

QUESTION 13 OF 15

RIGHT!

Cybercriminals pretend to be a trusted origin in order to capture your attention and get your information to perform cyberattacks.

NEXT QUESTION

QUESTION 14 OF 15

Who is the target of Whaling attacks?

Senior and executive employees

Users

Apprentices

QUESTION 14 OF 15

RIGHT!

Whaling attacks are social engineering attack that targets senior positions in order to gain access into the system.

NEXT QUESTION

QUESTION 15 OF 15

What type of attack demands a ransom?

Spyware

Ransomware

DDos

QUESTION 15 OF 15

RIGHT!

In a Ransomware attack, bad actors gain access into the system, encrypt sensitive data and demand a ransom to decrypt the compromised data.

See results

RESULTS

CONGRATULATIONS!

11-15 CORRECT

0-5 CORRECT

6-10 CORRECT

OH NO!

TRY AGAIN

0-5 CORRECT ANSWERS

Your probability ot being attack is high. Try again this quiz and be aware of threats.

5-10 CORRECT ANSWERS

Your probability ot being attack is MeDium. being aware of threats ir crucial to stay safe and care of your information.

11-15 CORRECT ANSWERS

Congratulations! Your probability ot being attack is Low. But BEing TOO CONFIDENT makes you vulnerable, so be aware of threats.