Want to create interactive content? It’s easy in Genially!

Get started free

IT Security Quiz

Lando Villar Collaguazo

Created on October 10, 2024

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

START

Help Duckrime get safe from cybercriminals.

Don't let Duckrime fall down!

Spiritual techniques

Physical Techniques

Psychological techniques

Which tactic Social engineering attacks use?

QUESTION 01 OF 15

Social engineering attacks are performed on psychological techniques in order to gain an advantage over their victims using motivators like love, money, fear, and status.

NEXT QUESTION

QUESTION 01 OF 15

RIGHT!

Which of these can be used as a vector for phishing attacks?

Both

SMS

Emails

QUESTION 02 OF 15

Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.

NEXT QUESTION

QUESTION 02 OF 15

RIGHT!

Malware is typically designed to:

Damage a computer, network or server

Fix software vulnerabilities

Improve data encryption

QUESTION 03 OF 15

Malware is malicious software designed to damage computers, networks or servers. Examples: Viruses, Trojans, Worms or Ransomware.

NEXT QUESTION

QUESTION 03 OF 15

RIGHT!

The main purpose of a DDoS (Denial-of-Service) attack is to:

Protect user data

Block Malware

flood servers

QUESTION 04 OF 15

DDoS attacks flood servers or networks to disrupt business operations.

NEXT QUESTION

QUESTION 04 OF 15

RIGHT!

What do MitM (Man-in-the-Middle) attacks want to intercept?

Malware downloads

Communications between two parties

Network hardware

QUESTION 05 OF 15

MitM attacks intercept the communication in a third-party relationship. Using public Wi-Fi can compromised your data.

NEXT QUESTION

QUESTION 05 OF 15

RIGHT!

SQL injection attacks insert malicious _______ into a vulnerable application.

Memes

SQL queries

Firewalls

QUESTION 06 OF 15

Malicious SQL queries are inserted into a vulnerable application.

NEXT QUESTION

QUESTION 06 OF 15

RIGHT!

Which tool is use in Brute Force attacks?

Web browsers

Password cracking tools

E-book readers

QUESTION 07 OF 15

Malicious actors systematically try all possible combinations of usernames or passwords to guess login credentials or encryption keys.

NEXT QUESTION

QUESTION 07 OF 15

RIGHT!

What makes Zero-Day exploits particularly dangerous?

They are publicly announced

They exploit unknown vulnerabilities

They require a password to attack

QUESTION 08 OF 15

Bad actors exploit a previously unknown vulnerability.

NEXT QUESTION

QUESTION 08 OF 15

RIGHT!

Who can be an Insider Threat?

Contractors

Both

Employees

QUESTION 09 OF 15

Insider Threat are current employees, contractors or vendors that cause harm due to its negligent or intentionally.

NEXT QUESTION

QUESTION 09 OF 15

RIGHT!

What is the purpose of Cryptojacking?

To hijack firewalls

To mine cryptocurrencies

To mine carbon

QUESTION 10 OF 15

Cryptojacking attacks are an unauthorised use of computing resources to mine cryptocurrencies.

NEXT QUESTION

QUESTION 10 OF 15

RIGHT!

Which of these attacks are in the category of Social Engineering attacks?

Tailgating

Both

Phishing attacks

QUESTION 11 OF 15

Social Engineering attacks manipulate people psychologically to take advantage of them and perform cyberattacks.

NEXT QUESTION

QUESTION 11 OF 15

RIGHT!

Which of them are purposes of Phishing attacks?

Download delicious files

Steal sensitive information

Both

QUESTION 12 OF 15

Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.

NEXT QUESTION

QUESTION 12 OF 15

RIGHT!

In a spoofing attack, what does a bad actor do?

Floods server with malicious traffic

Pretends to be a trusted origin

Intercepts communications

QUESTION 13 OF 15

Cybercriminals pretend to be a trusted origin in order to capture your attention and get your information to perform cyberattacks.

NEXT QUESTION

QUESTION 13 OF 15

RIGHT!

Who is the target of Whaling attacks?

Users

Senior and executive employees

Apprentices

QUESTION 14 OF 15

Whaling attacks are social engineering attack that targets senior positions in order to gain access into the system.

NEXT QUESTION

QUESTION 14 OF 15

RIGHT!

What type of attack demands a ransom?

DDos

Ransomware

Spyware

QUESTION 15 OF 15

In a Ransomware attack, bad actors gain access into the system, encrypt sensitive data and demand a ransom to decrypt the compromised data.

See results

QUESTION 15 OF 15

RIGHT!

11-15 CORRECT

6-10 CORRECT

0-5 CORRECT

CONGRATULATIONS!

RESULTS

OH NO!

TRY AGAIN

0-5 CORRECT ANSWERS

Your probability ot being attack is high. Try again this quiz and be aware of threats.

5-10 CORRECT ANSWERS

Your probability ot being attack is MeDium. being aware of threats ir crucial to stay safe and care of your information.

11-15 CORRECT ANSWERS

Congratulations! Your probability ot being attack is Low. But BEing TOO CONFIDENT makes you vulnerable, so be aware of threats.