Don't let Duckrime fall down!
Help Duckrime get safe from cybercriminals.
START
QUESTION 01 OF 15
Which tactic Social engineering attacks use?
Spiritual techniques
Psychological techniques
Physical Techniques
QUESTION 01 OF 15
RIGHT!
Social engineering attacks are performed on psychological techniques in order to gain an advantage over their victims using motivators like love, money, fear, and status.
NEXT QUESTION
QUESTION 02 OF 15
Which of these can be used as a vector for phishing attacks?
SMS
Emails
Both
QUESTION 02 OF 15
RIGHT!
Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.
NEXT QUESTION
QUESTION 03 OF 15
Malware is typically designed to:
Damage a computer, network or server
Improve data encryption
Fix software vulnerabilities
QUESTION 03 OF 15
RIGHT!
Malware is malicious software designed to damage computers, networks or servers. Examples: Viruses, Trojans, Worms or Ransomware.
NEXT QUESTION
QUESTION 04 OF 15
The main purpose of a DDoS (Denial-of-Service) attack is to:
flood servers
Block Malware
Protect user data
QUESTION 04 OF 15
RIGHT!
DDoS attacks flood servers or networks to disrupt business operations.
NEXT QUESTION
QUESTION 05 OF 15
What do MitM (Man-in-the-Middle) attacks want to intercept?
Malware downloads
Communications between two parties
Network hardware
QUESTION 05 OF 15
RIGHT!
MitM attacks intercept the communication in a third-party relationship. Using public Wi-Fi can compromised your data.
NEXT QUESTION
QUESTION 06 OF 15
SQL injection attacks insert malicious _______ into a vulnerable application.
SQL queries
Memes
Firewalls
QUESTION 06 OF 15
RIGHT!
Malicious SQL queries are inserted into a vulnerable application.
NEXT QUESTION
QUESTION 07 OF 15
Which tool is use in Brute Force attacks?
Password cracking tools
Web browsers
E-book readers
QUESTION 07 OF 15
RIGHT!
Malicious actors systematically try all possible combinations of usernames or passwords to guess login credentials or encryption keys.
NEXT QUESTION
QUESTION 08 OF 15
What makes Zero-Day exploits particularly dangerous?
They exploit unknown vulnerabilities
They require a password to attack
They are publicly announced
QUESTION 08 OF 15
RIGHT!
Bad actors exploit a previously unknown vulnerability.
NEXT QUESTION
QUESTION 09 OF 15
Who can be an Insider Threat?
Contractors
Both
Employees
QUESTION 09 OF 15
RIGHT!
Insider Threat are current employees, contractors or vendors that cause harm due to its negligent or intentionally.
NEXT QUESTION
QUESTION 10 OF 15
What is the purpose of Cryptojacking?
To mine cryptocurrencies
To hijack firewalls
To mine carbon
QUESTION 10 OF 15
RIGHT!
Cryptojacking attacks are an unauthorised use of computing resources to mine cryptocurrencies.
NEXT QUESTION
QUESTION 11 OF 15
Which of these attacks are in the category of Social Engineering attacks?
Phishing attacks
Both
Tailgating
QUESTION 11 OF 15
RIGHT!
Social Engineering attacks manipulate people psychologically to take advantage of them and perform cyberattacks.
NEXT QUESTION
QUESTION 12 OF 15
Which of them are purposes of Phishing attacks?
Download delicious files
Steal sensitive information
Both
QUESTION 12 OF 15
RIGHT!
Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.
NEXT QUESTION
QUESTION 13 OF 15
In a spoofing attack, what does a bad actor do?
Intercepts communications
Pretends to be a trusted origin
Floods server with malicious traffic
QUESTION 13 OF 15
RIGHT!
Cybercriminals pretend to be a trusted origin in order to capture your attention and get your information to perform cyberattacks.
NEXT QUESTION
QUESTION 14 OF 15
Who is the target of Whaling attacks?
Senior and executive employees
Users
Apprentices
QUESTION 14 OF 15
RIGHT!
Whaling attacks are social engineering attack that targets senior positions in order to gain access into the system.
NEXT QUESTION
QUESTION 15 OF 15
What type of attack demands a ransom?
Spyware
Ransomware
DDos
QUESTION 15 OF 15
RIGHT!
In a Ransomware attack, bad actors gain access into the system, encrypt sensitive data and demand a ransom to decrypt the compromised data.
See results
RESULTS
CONGRATULATIONS!
11-15 CORRECT
0-5 CORRECT
6-10 CORRECT
OH NO!
TRY AGAIN
0-5 CORRECT ANSWERS
Your probability ot being attack is high. Try again this quiz and be aware of threats.
5-10 CORRECT ANSWERS
Your probability ot being attack is MeDium. being aware of threats ir crucial to stay safe and care of your information.
11-15 CORRECT ANSWERS
Congratulations! Your probability ot being attack is Low. But BEing TOO CONFIDENT makes you vulnerable, so be aware of threats.
IT Security Quiz
Lando Villar Collaguazo
Created on October 10, 2024
Start designing with a free template
Discover more than 1500 professional designs like these:
View
Christmas Spirit Test
View
Corporate Icebreaker
View
Retro Bits Quiz
View
Bomb Quiz
View
Witchcraft Quiz
View
Halloween Quiz
View
Day of the Dead Quiz
Explore all templates
Transcript
Don't let Duckrime fall down!
Help Duckrime get safe from cybercriminals.
START
QUESTION 01 OF 15
Which tactic Social engineering attacks use?
Spiritual techniques
Psychological techniques
Physical Techniques
QUESTION 01 OF 15
RIGHT!
Social engineering attacks are performed on psychological techniques in order to gain an advantage over their victims using motivators like love, money, fear, and status.
NEXT QUESTION
QUESTION 02 OF 15
Which of these can be used as a vector for phishing attacks?
SMS
Emails
Both
QUESTION 02 OF 15
RIGHT!
Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.
NEXT QUESTION
QUESTION 03 OF 15
Malware is typically designed to:
Damage a computer, network or server
Improve data encryption
Fix software vulnerabilities
QUESTION 03 OF 15
RIGHT!
Malware is malicious software designed to damage computers, networks or servers. Examples: Viruses, Trojans, Worms or Ransomware.
NEXT QUESTION
QUESTION 04 OF 15
The main purpose of a DDoS (Denial-of-Service) attack is to:
flood servers
Block Malware
Protect user data
QUESTION 04 OF 15
RIGHT!
DDoS attacks flood servers or networks to disrupt business operations.
NEXT QUESTION
QUESTION 05 OF 15
What do MitM (Man-in-the-Middle) attacks want to intercept?
Malware downloads
Communications between two parties
Network hardware
QUESTION 05 OF 15
RIGHT!
MitM attacks intercept the communication in a third-party relationship. Using public Wi-Fi can compromised your data.
NEXT QUESTION
QUESTION 06 OF 15
SQL injection attacks insert malicious _______ into a vulnerable application.
SQL queries
Memes
Firewalls
QUESTION 06 OF 15
RIGHT!
Malicious SQL queries are inserted into a vulnerable application.
NEXT QUESTION
QUESTION 07 OF 15
Which tool is use in Brute Force attacks?
Password cracking tools
Web browsers
E-book readers
QUESTION 07 OF 15
RIGHT!
Malicious actors systematically try all possible combinations of usernames or passwords to guess login credentials or encryption keys.
NEXT QUESTION
QUESTION 08 OF 15
What makes Zero-Day exploits particularly dangerous?
They exploit unknown vulnerabilities
They require a password to attack
They are publicly announced
QUESTION 08 OF 15
RIGHT!
Bad actors exploit a previously unknown vulnerability.
NEXT QUESTION
QUESTION 09 OF 15
Who can be an Insider Threat?
Contractors
Both
Employees
QUESTION 09 OF 15
RIGHT!
Insider Threat are current employees, contractors or vendors that cause harm due to its negligent or intentionally.
NEXT QUESTION
QUESTION 10 OF 15
What is the purpose of Cryptojacking?
To mine cryptocurrencies
To hijack firewalls
To mine carbon
QUESTION 10 OF 15
RIGHT!
Cryptojacking attacks are an unauthorised use of computing resources to mine cryptocurrencies.
NEXT QUESTION
QUESTION 11 OF 15
Which of these attacks are in the category of Social Engineering attacks?
Phishing attacks
Both
Tailgating
QUESTION 11 OF 15
RIGHT!
Social Engineering attacks manipulate people psychologically to take advantage of them and perform cyberattacks.
NEXT QUESTION
QUESTION 12 OF 15
Which of them are purposes of Phishing attacks?
Download delicious files
Steal sensitive information
Both
QUESTION 12 OF 15
RIGHT!
Phishing attacks use emails, SMS, phone and websites to trick users and steal sensitive information.
NEXT QUESTION
QUESTION 13 OF 15
In a spoofing attack, what does a bad actor do?
Intercepts communications
Pretends to be a trusted origin
Floods server with malicious traffic
QUESTION 13 OF 15
RIGHT!
Cybercriminals pretend to be a trusted origin in order to capture your attention and get your information to perform cyberattacks.
NEXT QUESTION
QUESTION 14 OF 15
Who is the target of Whaling attacks?
Senior and executive employees
Users
Apprentices
QUESTION 14 OF 15
RIGHT!
Whaling attacks are social engineering attack that targets senior positions in order to gain access into the system.
NEXT QUESTION
QUESTION 15 OF 15
What type of attack demands a ransom?
Spyware
Ransomware
DDos
QUESTION 15 OF 15
RIGHT!
In a Ransomware attack, bad actors gain access into the system, encrypt sensitive data and demand a ransom to decrypt the compromised data.
See results
RESULTS
CONGRATULATIONS!
11-15 CORRECT
0-5 CORRECT
6-10 CORRECT
OH NO!
TRY AGAIN
0-5 CORRECT ANSWERS
Your probability ot being attack is high. Try again this quiz and be aware of threats.
5-10 CORRECT ANSWERS
Your probability ot being attack is MeDium. being aware of threats ir crucial to stay safe and care of your information.
11-15 CORRECT ANSWERS
Congratulations! Your probability ot being attack is Low. But BEing TOO CONFIDENT makes you vulnerable, so be aware of threats.