Want to make creations as awesome as this one?

Transcript

Don't let Duckrime fall down!

Help Duckrime get safe from cybercriminals.

START

QUESTION 01 OF 15

Which tactic Social engineering attacks use?

Psychological techniques

Physical Techniques

Spiritual techniques

RIGHT!

QUESTION 01 OF 15

NEXT QUESTION

Social engineering attacks are performed on psychological techniques in order to gain an advantage over their victims using motivators like love, money, fear, and status.

QUESTION 02 OF 15

Emails

SMS

Both

Which of these can be used as a vector for phishing attacks?

RIGHT!

QUESTION 02 OF 15

NEXT QUESTION

Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.

QUESTION 03 OF 15

Improve data encryption

Fix software vulnerabilities

Damage a computer, network or server

Malware is typically designed to:

RIGHT!

QUESTION 03 OF 15

NEXT QUESTION

Malware is malicious software designed to damage computers, networks or servers. Examples: Viruses, Trojans, Worms or Ransomware.

QUESTION 04 OF 15

flood servers

Block Malware

Protect user data

The main purpose of a DDoS (Denial-of-Service) attack is to:

RIGHT!

QUESTION 04 OF 15

NEXT QUESTION

DDoS attacks flood servers or networks to disrupt business operations.

QUESTION 05 OF 15

Network hardware

Communications between two parties

Malware downloads

What do MitM (Man-in-the-Middle) attacks want to intercept?

RIGHT!

QUESTION 05 OF 15

NEXT QUESTION

MitM attacks intercept the communication in a third-party relationship. Using public Wi-Fi can compromised your data.

QUESTION 06 OF 15

Firewalls

SQL queries

Memes

SQL injection attacks insert malicious _______ into a vulnerable application.

RIGHT!

QUESTION 06 OF 15

NEXT QUESTION

Malicious SQL queries are inserted into a vulnerable application.

QUESTION 07 OF 15

E-book readers

Password cracking tools

Web browsers

Which tool is use in Brute Force attacks?

RIGHT!

QUESTION 07 OF 15

NEXT QUESTION

Malicious actors systematically try all possible combinations of usernames or passwords to guess login credentials or encryption keys.

QUESTION 08 OF 15

They require a password to attack

They exploit unknown vulnerabilities

They are publicly announced

What makes Zero-Day exploits particularly dangerous?

RIGHT!

QUESTION 08 OF 15

NEXT QUESTION

Bad actors exploit a previously unknown vulnerability.

QUESTION 09 OF 15

Employees

Both

Contractors

Who can be an Insider Threat?

RIGHT!

QUESTION 09 OF 15

NEXT QUESTION

Insider Threat are current employees, contractors or vendors that cause harm due to its negligent or intentionally.

QUESTION 10 OF 15

To mine carbon

To mine cryptocurrencies

To hijack firewalls

What is the purpose of Cryptojacking?

RIGHT!

QUESTION 10 OF 15

NEXT QUESTION

Cryptojacking attacks are an unauthorised use of computing resources to mine cryptocurrencies.

QUESTION 11 OF 15

Phishing attacks

Both

Tailgating

Which of these attacks are in the category of Social Engineering attacks?

RIGHT!

QUESTION 11 OF 15

NEXT QUESTION

Social Engineering attacks manipulate people psychologically to take advantage of them and perform cyberattacks.

QUESTION 12 OF 15

Both

Steal sensitive information

Download delicious files

Which of them are purposes of Phishing attacks?

RIGHT!

QUESTION 12 OF 15

NEXT QUESTION

Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.

QUESTION 13 OF 15

Intercepts communications

Pretends to be a trusted origin

Floods server with malicious traffic

In a spoofing attack, what does a bad actor do?

RIGHT!

QUESTION 13 OF 15

NEXT QUESTION

Cybercriminals pretend to be a trusted origin in order to capture your attention and get your information to perform cyberattacks.

QUESTION 14 OF 15

Apprentices

Senior and executive employees

Users

Who is the target of Whaling attacks?

RIGHT!

QUESTION 14 OF 15

NEXT QUESTION

Whaling attacks are social engineering attack that targets senior positions in order to gain access into the system.

QUESTION 15 OF 15

Spyware

Ransomware

DDos

What type of attack demands a ransom?

RIGHT!

QUESTION 15 OF 15

See results

In a Ransomware attack, bad actors gain access into the system, encrypt sensitive data and demand a ransom to decrypt the compromised data.

RESULTS

CONGRATULATIONS!

0-5 CORRECT

6-10 CORRECT

11-15 CORRECT

TRY AGAIN

OH NO!

Your probability ot being attack is high. Try again this quiz and be aware of threats.

0-5 CORRECT ANSWERS

Your probability ot being attack is MeDium. being aware of threats ir crucial to stay safe and care of your information.

5-10 CORRECT ANSWERS

Congratulations! Your probability ot being attack is Low. But BEing TOO CONFIDENT makes you vulnerable, so be aware of threats.

11-15 CORRECT ANSWERS