placeholder image to represent content

Cyberattack revision

Quiz by sharon Hockley

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
28 questions
Show answers
  • Q1
    What is Malware?
    Software designed to interfere with a computer's normal functioning
    A small self −contained and self −replicating computer program that invades computers on a network and usually performs a destructive action.
    A social engineering attack intended to redirect a website's traffic to another fake website.
    A social engineering act that involves standing behind a targeted victim and watching what they type.
    30s
  • Q2
    What is PHISHING ?
    A social engineering scam by which a user is tricked into revealing personal\confidential information (via email or website)
    A social engineering act of creating and using an invented scenario to obtain information or money from a targeted victim (using persuasion).
    Malware that replicates by reproducing itself or infecting other programs by modifying them.
    Software designed to interfere with a computer's normal functioning
    30s
  • Q3
    What is SPAM ?
    Email that is not wanted -An email that is sent to large number of people and contains mostly advertising
    Software designed to interfere with a computer's normal functioning
    Software that gathers data without the knowledge of the user, and sends them to a different entity.
    A social engineering scam by which a user is tricked into revealing personal\confidential information (via email or website)
    30s
  • Q4
    What is PHARMING?
    A social engineering attack intended to redirect a website's traffic to another fake website.
    Malicious computer program which is used to hack into a computer by misleading users of its true intent.
    A social engineering act of creating and using an invented scenario to obtain information or money from a targeted victim (using persuasion).
    Software designed to interfere with a computer's normal functioning
    30s
  • Q5
    What is a WORM?
    A program that records which keys a user presses
    A trial and error method used to obtain information such as a user's password, identification etc.
    Software designed to interfere with a computer's normal functioning
    A small self −contained and self −replicating computer program that invades computers on a network and usually performs a destructive action.
    30s
  • Q6
    What is BLAGGING?
    Multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
    A social engineering scam by which a user is tricked into revealing personal\confidential information (via email or website)
    Malicious computer program which is used to hack into a computer by misleading users of its true intent.
    A social engineering act of creating and using an invented scenario to obtain information or money from a targeted victim (using persuasion).
    30s
  • Q7
    What is a BRUTE FORCE ATTACK?
    Malware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.
    A trial and error method used to obtain information such as a user's password, identification etc.
    Multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
    A social engineering attack intended to redirect a website's traffic to another fake website.
    30s
  • Q8
    What is a DENIAL OF SERVICE ATTACK?
    Malicious computer program which is used to hack into a computer by misleading users of its true intent.
    Malware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.
    Multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
    Software designed to interfere with a computer's normal functioning
    30s
  • Q9
    What is a VIRUS?
    A social engineering act that involves standing behind a targeted victim and watching what they type.
    Malware that replicates by reproducing itself or infecting other programs by modifying them.
    A trial and error method used to obtain information such as a user's password, identification etc.
    Software designed to interfere with a computer's normal functioning
    30s
  • Q10
    What is SPYWARE?
    Software that gathers data without the knowledge of the user, and sends them to a different entity.
    A small self −contained and self −replicating computer program that invades computers on a network and usually performs a destructive action.
    A program that records which keys a user presses
    Malware that replicates by reproducing itself or infecting other programs by modifying them.
    30s
  • Q11
    What is a TROJAN?
    A trial and error method used to obtain information such as a user's password, identification etc.
    A social engineering act that involves standing behind a targeted victim and watching what they type.
    Malicious computer program which is used to hack into a computer by misleading users of its true intent.
    Software that gathers data without the knowledge of the user, and sends them to a different entity.
    30s
  • Q12
    What is a KEY LOGGER?
    A program that records which keys a user presses
    Malware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.
    Software that gathers data without the knowledge of the user, and sends them to a different entity.
    A social engineering attack intended to redirect a website's traffic to another fake website.
    30s
  • Q13
    What is RANSOMEWARE?
    A social engineering act that involves standing behind a targeted victim and watching what they type.
    A social engineering act of creating and using an invented scenario to obtain information or money from a targeted victim (using persuasion).
    Multiple systems flood the bandwidth or resources of a targeted system, usually one or more web servers.
    Malware that extorts money from victims by blocking access to their computer or encrypting the data stored on it.
    30s
  • Q14
    What is SHOULDERING?
    A program that records which keys a user presses
    A small self −contained and self −replicating computer program that invades computers on a network and usually performs a destructive action.
    A social engineering act that involves standing behind a targeted victim and watching what they type.
    Malware that replicates by reproducing itself or infecting other programs by modifying them.
    30s
  • Q15
    Software designed to interfere with a computer's normal functioning
    VIRUS
    WORM
    SPAM
    MALWARE
    30s

Teachers give this quiz to your class