placeholder image to represent content

Cybersecurity Threat Level

Quiz by Cessa De Guzman

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1

    An employee receives an email from a seemingly legitimate source asking for sensitive information such as login credentials.

    High

    Elevated

    Severe

    Low

    Guarded

    45s
  • Q2

    A user unknowingly downloads a ransomware attachment from an email, which encrypts all their files and demands a ransom for the decryption key.

    Severe

    Guarded

    Elevated

    Low

    High

    45s
  • Q3

    A known vulnerability in widely used software remains unpatched, leaving systems exposed to potential exploits.

    Guarded

    Severe

    Low

    High

    Elevated

    45s
  • Q4

    A disgruntled employee with access to sensitive data decides to steal or leak information.

    High

    Elevated

    Severe

    Low

    Guarded

    45s
  • Q5

    A website experiences a massive influx of traffic from multiple sources, overwhelming the server and causing it to crash.

    Guarded

    Low

    High

    Severe

    Elevated

    45s
  • Q6

    An organization allows employees to use weak passwords that are easily guessable.

    Elevated

    Guarded

    Severe

    Low

    High

    45s
  • Q7

    An attacker intercepts and possibly alters the communication between two parties without their knowledge.

    Low

    Elevated

    Severe

    Guarded

    High

    45s
  • Q8

    An attacker uses manipulation techniques to trick employees into revealing confidential information or performing actions that compromise security.

    Elevated

    Severe

    High

    Guarded

    Low

    45s
  • Q9

    A sophisticated and prolonged cyberattack where the attacker remains undetected within a network to steal data over an extended period.

    Elevated

    Severe

    Guarded

    Low

    High

    45s
  • Q10

    Internet of Things (IoT) devices within a network have weak security measures, making them vulnerable to attacks.

    Elevated

    Severe

    High

    Guarded

    Low

    45s

Teachers give this quiz to your class