0
0
Cybersecurityknowledge~20 mins

Types of cyber threats in Cybersecurity - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Cyber Threats Master
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Understanding Phishing Attacks

Which of the following best describes a phishing attack?

AA software that encrypts files and demands payment for decryption.
BAn attempt to trick users into revealing personal information by pretending to be a trustworthy entity.
CA program that secretly records keystrokes to steal passwords.
DAn attack that floods a network with excessive traffic to cause disruption.
Attempts:
2 left
💡 Hint

Think about scams that use fake emails or websites to steal information.

📋 Factual
intermediate
2:00remaining
Identifying Ransomware Characteristics

What is the primary effect of ransomware on a victim's computer?

AIt encrypts files and demands payment to restore access.
BIt steals data silently without the user's knowledge.
CIt sends spam emails to the victim's contacts.
DIt monitors network traffic for sensitive information.
Attempts:
2 left
💡 Hint

Consider what happens when you cannot open your own files and see a payment demand.

🔍 Analysis
advanced
2:00remaining
Analyzing Denial of Service (DoS) Attacks

Which of the following scenarios best illustrates a Denial of Service (DoS) attack?

AA virus deletes files from a computer without warning.
BAn attacker installs spyware to monitor user activity over time.
CA phishing email tricks a user into revealing their password.
DA hacker sends a huge amount of traffic to a website, making it unavailable to users.
Attempts:
2 left
💡 Hint

Think about attacks that overwhelm a service to stop it from working.

Comparison
advanced
2:00remaining
Comparing Malware Types

Which statement correctly distinguishes a virus from a worm?

AA virus requires user action to spread, while a worm spreads automatically without user help.
BA worm attaches itself to files, but a virus operates independently.
CA virus encrypts files for ransom, while a worm steals passwords.
DA worm only affects networks, while a virus only affects individual files.
Attempts:
2 left
💡 Hint

Consider how each type spreads from one computer to another.

Reasoning
expert
2:00remaining
Evaluating Social Engineering Risks

A company employee receives a call from someone claiming to be IT support asking for their login password to fix an urgent issue. What type of cyber threat does this represent?

APhishing attack
BRansomware attack
CPretexting attack
DMan-in-the-middle attack
Attempts:
2 left
💡 Hint

Think about attacks that use made-up stories to trick people into giving information.