Online Threats: CyberSecurity Quiz!

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Caelix
C
Caelix
Community Contributor
Quizzes Created: 1 | Total Attempts: 1,219
Questions: 10 | Attempts: 1,219

SettingsSettingsSettings
Online Threats: Cybersecurity Quiz! - Quiz

.


Questions and Answers
  • 1. 

    ____________ a malicious software that infects your computer, such as computer viruses, worms, Trojan horses, spyware, and adware.

    Explanation
    Malware refers to a range of malicious software that can infect computers, including viruses, worms, Trojan horses, spyware, and adware. These programs are designed to harm or exploit computer systems, steal sensitive information, or disrupt normal operations. They can be spread through various means, such as email attachments, infected websites, or removable media. Malware can cause significant damage to a computer system, compromising its security and performance. It is important to have effective antivirus and security measures in place to protect against malware threats.

    Rate this question:

  • 2. 

    A means to point you to a malicious and illegitimate website by redirecting the legitimate URL. Even if the URL is entered correctly, it can still be redirected to a fake website.

    • A.

      Phishing

    • B.

      Pharming

    • C.

      Ransomware

    • D.

      Phlanting

    Correct Answer
    B. pHarming
    Explanation
    Pharming is the correct answer because it involves redirecting users to a malicious and fake website, even if they enter the correct URL. This technique is often used by cybercriminals to deceive users and steal their personal information, such as login credentials or financial details. Unlike phishing, which relies on tricking users into clicking on a fraudulent link, pharming directly manipulates the DNS (Domain Name System) to redirect legitimate traffic to a fake website. This makes it harder for users to detect the scam, as they are not redirected through a suspicious link.

    Rate this question:

  • 3. 

    A website or email address that is created to look like it comes from a legitimate source. An email address may even include your own name, or the name of someone you know, making it difficult to discern whether or not the sender is real.

    • A.

      Spyware

    • B.

      Spoofing

    • C.

      Spam

    • D.

      Wi-Fi Eavesdropping

    Correct Answer
    B. Spoofing
    Explanation
    Spoofing refers to the act of creating a website or email address that appears to be from a trustworthy source, but is actually fake. The sender may use familiar names or addresses to deceive the recipient into thinking that the communication is legitimate. This can make it challenging for the recipient to determine whether the sender is genuine or not.

    Rate this question:

  • 4. 

    Worm is an executable file that will install itself and run automatically once it's downloaded.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Trojan Horse

    Rate this question:

  • 5. 

    ________ can record instant messages, email, and capture any information you type at any time using your keyboard, including usernames, passwords, and other personally identifiable information(PII).

    Correct Answer
    Keylogger
    Explanation
    A keylogger is a type of software or hardware device that can record and monitor keystrokes made on a computer or mobile device. It can capture all typed information, including instant messages, emails, usernames, passwords, and other personally identifiable information (PII). This allows unauthorized individuals to gain access to sensitive data without the user's knowledge or consent.

    Rate this question:

  • 6. 

    Virtual “listening in” on information that's shared over an insecure (not encrypted) WiFi network.

    • A.

      WI-FI Master

    • B.

      WPA2 Handshake Vulnerabilities

    • C.

      Wi-Fi Eavesdropping

    • D.

      Spyware

    Correct Answer
    C. Wi-Fi Eavesdropping
    Explanation
    Wi-Fi eavesdropping refers to the act of intercepting and listening to information being transmitted over a Wi-Fi network without authorization. This can occur when the network is not encrypted, making it vulnerable to unauthorized access. Eavesdroppers can capture and potentially exploit sensitive information shared over the network, such as passwords, financial data, or personal communications. Therefore, Wi-Fi eavesdropping is a significant security concern, highlighting the importance of using encryption protocols like WPA2 to protect wireless networks from such attacks.

    Rate this question:

  • 7. 

    Spyware is software that is installed on a computing device with the end user's knowledge.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    without the end users kwonloegde

    Rate this question:

  • 8. 

    ________ is a collection of internet-connected devices, which may include PCs, servers, mobile devices, and the internet of things devices that are infected and controlled by a common type of malware.

    Correct Answer
    Botnet
    Explanation
    A botnet is a network of compromised devices, such as computers, servers, and mobile devices, that have been infected with malware and are under the control of a single entity. These infected devices, also known as bots, can be used by cybercriminals to carry out various malicious activities, such as launching distributed denial-of-service (DDoS) attacks, sending spam emails, stealing sensitive information, or spreading more malware. The common characteristic of a botnet is that it is a collection of internet-connected devices that have been hijacked by malware and are being controlled remotely by a malicious actor.

    Rate this question:

  • 9. 

    ________ is a cyber attack intended to redirect a website's traffic to another, fake site. 

    Correct Answer
    Pharming
    Explanation
    Pharming is a type of cyber attack where hackers manipulate the DNS (Domain Name System) to redirect website traffic to a fake site. This fake site is designed to mimic the original website, tricking users into entering sensitive information such as login credentials or financial details. Unlike phishing, where users are lured to the fake site through deceptive emails or messages, pharming directly redirects users to the malicious site without their knowledge or consent. This attack can be carried out by exploiting vulnerabilities in DNS servers or by infecting users' computers with malware that alters their DNS settings.

    Rate this question:

  • 10. 

    Hacking is the process by which cybercriminals gain access to your computer.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Hacking is indeed the process by which cybercriminals gain unauthorized access to a computer system. It involves exploiting vulnerabilities in the system's security measures to gain control or extract sensitive information. Hackers can use various techniques and tools to carry out their attacks, such as malware, phishing, or brute-force attacks. Therefore, the statement "Hacking is the process by which cybercriminals gain access to your computer" is true.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Jul 18, 2018
    Quiz Created by
    Caelix
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.