Want to create interactive content? It’s easy in Genially!
IT Security Quiz
Lando Villar Collaguazo
Created on October 10, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
START
Help Duckrime get safe from cybercriminals.
Don't let Duckrime fall down!
Spiritual techniques
Physical Techniques
Psychological techniques
Which tactic Social engineering attacks use?
QUESTION 01 OF 15
Social engineering attacks are performed on psychological techniques in order to gain an advantage over their victims using motivators like love, money, fear, and status.
NEXT QUESTION
QUESTION 01 OF 15
RIGHT!
Which of these can be used as a vector for phishing attacks?
Both
SMS
Emails
QUESTION 02 OF 15
Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.
NEXT QUESTION
QUESTION 02 OF 15
RIGHT!
Malware is typically designed to:
Damage a computer, network or server
Fix software vulnerabilities
Improve data encryption
QUESTION 03 OF 15
Malware is malicious software designed to damage computers, networks or servers. Examples: Viruses, Trojans, Worms or Ransomware.
NEXT QUESTION
QUESTION 03 OF 15
RIGHT!
The main purpose of a DDoS (Denial-of-Service) attack is to:
Protect user data
Block Malware
flood servers
QUESTION 04 OF 15
DDoS attacks flood servers or networks to disrupt business operations.
NEXT QUESTION
QUESTION 04 OF 15
RIGHT!
What do MitM (Man-in-the-Middle) attacks want to intercept?
Malware downloads
Communications between two parties
Network hardware
QUESTION 05 OF 15
MitM attacks intercept the communication in a third-party relationship. Using public Wi-Fi can compromised your data.
NEXT QUESTION
QUESTION 05 OF 15
RIGHT!
SQL injection attacks insert malicious _______ into a vulnerable application.
Memes
SQL queries
Firewalls
QUESTION 06 OF 15
Malicious SQL queries are inserted into a vulnerable application.
NEXT QUESTION
QUESTION 06 OF 15
RIGHT!
Which tool is use in Brute Force attacks?
Web browsers
Password cracking tools
E-book readers
QUESTION 07 OF 15
Malicious actors systematically try all possible combinations of usernames or passwords to guess login credentials or encryption keys.
NEXT QUESTION
QUESTION 07 OF 15
RIGHT!
What makes Zero-Day exploits particularly dangerous?
They are publicly announced
They exploit unknown vulnerabilities
They require a password to attack
QUESTION 08 OF 15
Bad actors exploit a previously unknown vulnerability.
NEXT QUESTION
QUESTION 08 OF 15
RIGHT!
Who can be an Insider Threat?
Contractors
Both
Employees
QUESTION 09 OF 15
Insider Threat are current employees, contractors or vendors that cause harm due to its negligent or intentionally.
NEXT QUESTION
QUESTION 09 OF 15
RIGHT!
What is the purpose of Cryptojacking?
To hijack firewalls
To mine cryptocurrencies
To mine carbon
QUESTION 10 OF 15
Cryptojacking attacks are an unauthorised use of computing resources to mine cryptocurrencies.
NEXT QUESTION
QUESTION 10 OF 15
RIGHT!
Which of these attacks are in the category of Social Engineering attacks?
Tailgating
Both
Phishing attacks
QUESTION 11 OF 15
Social Engineering attacks manipulate people psychologically to take advantage of them and perform cyberattacks.
NEXT QUESTION
QUESTION 11 OF 15
RIGHT!
Which of them are purposes of Phishing attacks?
Download delicious files
Steal sensitive information
Both
QUESTION 12 OF 15
Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.
NEXT QUESTION
QUESTION 12 OF 15
RIGHT!
In a spoofing attack, what does a bad actor do?
Floods server with malicious traffic
Pretends to be a trusted origin
Intercepts communications
QUESTION 13 OF 15
Cybercriminals pretend to be a trusted origin in order to capture your attention and get your information to perform cyberattacks.
NEXT QUESTION
QUESTION 13 OF 15
RIGHT!
Who is the target of Whaling attacks?
Users
Senior and executive employees
Apprentices
QUESTION 14 OF 15
Whaling attacks are social engineering attack that targets senior positions in order to gain access into the system.
NEXT QUESTION
QUESTION 14 OF 15
RIGHT!
What type of attack demands a ransom?
DDos
Ransomware
Spyware
QUESTION 15 OF 15
In a Ransomware attack, bad actors gain access into the system, encrypt sensitive data and demand a ransom to decrypt the compromised data.
See results
QUESTION 15 OF 15
RIGHT!
11-15 CORRECT
6-10 CORRECT
0-5 CORRECT
CONGRATULATIONS!
RESULTS
OH NO!
TRY AGAIN
0-5 CORRECT ANSWERS
Your probability ot being attack is high. Try again this quiz and be aware of threats.
5-10 CORRECT ANSWERS
Your probability ot being attack is MeDium. being aware of threats ir crucial to stay safe and care of your information.
11-15 CORRECT ANSWERS
Congratulations! Your probability ot being attack is Low. But BEing TOO CONFIDENT makes you vulnerable, so be aware of threats.