IT Security Quiz
Lando Villar Collaguazo
Created on October 10, 2024
More creations to inspire you
MODALS 1 BACH MARIO GAME
Quizzes
ANIMALS BY CATEGORY
Quizzes
DRACULA ESL
Quizzes
TRUE FALSE GEOGRAPHY
Quizzes
ENGLISH SCHOOL VOCABULARY
Quizzes
PARTS OF SPEECH REVIEW
Quizzes
RECYCLING SORTING GAME
Quizzes
Transcript
Don't let Duckrime fall down!
Help Duckrime get safe from cybercriminals.
START
QUESTION 01 OF 15
Which tactic Social engineering attacks use?
Psychological techniques
Physical Techniques
Spiritual techniques
RIGHT!
QUESTION 01 OF 15
NEXT QUESTION
Social engineering attacks are performed on psychological techniques in order to gain an advantage over their victims using motivators like love, money, fear, and status.
QUESTION 02 OF 15
Emails
SMS
Both
Which of these can be used as a vector for phishing attacks?
RIGHT!
QUESTION 02 OF 15
NEXT QUESTION
Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.
QUESTION 03 OF 15
Improve data encryption
Fix software vulnerabilities
Damage a computer, network or server
Malware is typically designed to:
RIGHT!
QUESTION 03 OF 15
NEXT QUESTION
Malware is malicious software designed to damage computers, networks or servers. Examples: Viruses, Trojans, Worms or Ransomware.
QUESTION 04 OF 15
flood servers
Block Malware
Protect user data
The main purpose of a DDoS (Denial-of-Service) attack is to:
RIGHT!
QUESTION 04 OF 15
NEXT QUESTION
DDoS attacks flood servers or networks to disrupt business operations.
QUESTION 05 OF 15
Network hardware
Communications between two parties
Malware downloads
What do MitM (Man-in-the-Middle) attacks want to intercept?
RIGHT!
QUESTION 05 OF 15
NEXT QUESTION
MitM attacks intercept the communication in a third-party relationship. Using public Wi-Fi can compromised your data.
QUESTION 06 OF 15
Firewalls
SQL queries
Memes
SQL injection attacks insert malicious _______ into a vulnerable application.
RIGHT!
QUESTION 06 OF 15
NEXT QUESTION
Malicious SQL queries are inserted into a vulnerable application.
QUESTION 07 OF 15
E-book readers
Password cracking tools
Web browsers
Which tool is use in Brute Force attacks?
RIGHT!
QUESTION 07 OF 15
NEXT QUESTION
Malicious actors systematically try all possible combinations of usernames or passwords to guess login credentials or encryption keys.
QUESTION 08 OF 15
They require a password to attack
They exploit unknown vulnerabilities
They are publicly announced
What makes Zero-Day exploits particularly dangerous?
RIGHT!
QUESTION 08 OF 15
NEXT QUESTION
Bad actors exploit a previously unknown vulnerability.
QUESTION 09 OF 15
Employees
Both
Contractors
Who can be an Insider Threat?
RIGHT!
QUESTION 09 OF 15
NEXT QUESTION
Insider Threat are current employees, contractors or vendors that cause harm due to its negligent or intentionally.
QUESTION 10 OF 15
To mine carbon
To mine cryptocurrencies
To hijack firewalls
What is the purpose of Cryptojacking?
RIGHT!
QUESTION 10 OF 15
NEXT QUESTION
Cryptojacking attacks are an unauthorised use of computing resources to mine cryptocurrencies.
QUESTION 11 OF 15
Phishing attacks
Both
Tailgating
Which of these attacks are in the category of Social Engineering attacks?
RIGHT!
QUESTION 11 OF 15
NEXT QUESTION
Social Engineering attacks manipulate people psychologically to take advantage of them and perform cyberattacks.
QUESTION 12 OF 15
Both
Steal sensitive information
Download delicious files
Which of them are purposes of Phishing attacks?
RIGHT!
QUESTION 12 OF 15
NEXT QUESTION
Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.
QUESTION 13 OF 15
Intercepts communications
Pretends to be a trusted origin
Floods server with malicious traffic
In a spoofing attack, what does a bad actor do?
RIGHT!
QUESTION 13 OF 15
NEXT QUESTION
Cybercriminals pretend to be a trusted origin in order to capture your attention and get your information to perform cyberattacks.
QUESTION 14 OF 15
Apprentices
Senior and executive employees
Users
Who is the target of Whaling attacks?
RIGHT!
QUESTION 14 OF 15
NEXT QUESTION
Whaling attacks are social engineering attack that targets senior positions in order to gain access into the system.
QUESTION 15 OF 15
Spyware
Ransomware
DDos
What type of attack demands a ransom?
RIGHT!
QUESTION 15 OF 15
See results
In a Ransomware attack, bad actors gain access into the system, encrypt sensitive data and demand a ransom to decrypt the compromised data.
RESULTS
CONGRATULATIONS!
0-5 CORRECT
6-10 CORRECT
11-15 CORRECT
TRY AGAIN
OH NO!
Your probability ot being attack is high. Try again this quiz and be aware of threats.
0-5 CORRECT ANSWERS
Your probability ot being attack is MeDium. being aware of threats ir crucial to stay safe and care of your information.
5-10 CORRECT ANSWERS
Congratulations! Your probability ot being attack is Low. But BEing TOO CONFIDENT makes you vulnerable, so be aware of threats.
11-15 CORRECT ANSWERS