
Cyber Attack
Quiz by Paul
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
15 questions
Show answers
- Q1What type of cyber attack involves overwhelming a system with traffic to make it unavailable?Phishing attackMan-in-the-middle attackDenial of Service (DoS) attackMalware attack30s
- Q2What type of cyber attack tricks users into providing their personal information by posing as a trustworthy entity?Phishing attackRansomware attackDenial of Service (DoS) attackSQL injection30s
- Q3Which type of cyber attack involves injecting malicious SQL code into a website's database to manipulate or steal data?SQL injectionPhishing attackDenial of Service (DoS) attackCross-site scripting (XSS)30s
- Q4What type of cyber attack involves taking control of a user's device through malicious software that encrypts their files?Ransomware attackSpoofing attackDenial of Service (DoS) attackPhishing attack30s
- Q5What type of cyber attack spreads malicious software through unsuspecting users opening an infected attachment or link in an email?Man-in-the-middle (MitM) attackDenial of Service (DoS) attackMalware attackSQL injection30s
- Q6Which type of cyber attack involves an attacker encrypting a victim's data and demanding a ransom for the decryption key?Ransomware attackDenial of Service (DoS) attackMan-in-the-middle (MitM) attackPhishing attack30s
- Q7Why are security measures essential for protecting against cyber attacks?They do not affect personal devicesThey make devices run slowerThey are only needed for large companiesThey help prevent unauthorized access and data breaches30s
- Q8Which of the following is a benefit of regularly updating security software?It reduces the functionality of the deviceIt makes the software more expensiveIt slows down the internet connectionIt protects against newly discovered vulnerabilities30s
- Q9What role does a firewall play in computer security?It monitors and controls incoming and outgoing network trafficIt stores data backupsIt repairs hardware issuesIt enhances internet speed30s
- Q10Why is it important to use strong passwords as a security measure?They are easier to rememberThey have no effect on securityThey make accounts less secureThey are harder for attackers to guess or crack30s
- Q11What is one reason to back up data regularly as a security measure?It uses more storage spaceIt makes the computer run fasterIt complicates data managementIt protects against data loss due to cyber attacks30s
- Q12Which security practice helps protect against malware infections?Ignoring software updatesUsing simple passwordsInstalling antivirus softwareDisabling firewalls30s
- Q13What is the purpose of encryption in data security?It speeds up data transmissionIt stores data without using spaceIt converts data into a format that is unreadable without a keyIt makes data easily accessible to everyone30s
- Q14What should you do if you receive a suspicious email asking for personal information?Reply with your informationOpen any attachmentsForward it to friendsDo not respond and report it as phishing30s
- Q15What is two-factor authentication (2FA) primarily used for?To add an extra layer of security to account loginsTo eliminate the need for passwordsTo speed up the login processTo make accounts harder to access30s