Challenge - 5 Problems
Threat Mastery Badge
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate2:00remaining
Identify the type of threat from a scenario
You receive an email that looks like it is from your bank asking you to click a link and enter your password to verify your account. What type of threat is this?
Attempts:
2 left
💡 Hint
Think about what the attacker wants: your personal information by tricking you.
✗ Incorrect
This is a classic example of phishing, where attackers try to trick you into giving sensitive information by pretending to be a trusted source.
🧠 Conceptual
intermediate2:00remaining
Understanding ransomware behavior
A computer suddenly shows a message demanding payment to unlock files. What has most likely happened?
Attempts:
2 left
💡 Hint
Think about what ransomware does to your files and what it demands.
✗ Incorrect
Ransomware encrypts files and demands payment to restore access. The message demanding payment is a key sign.
❓ trace
advanced2:00remaining
Trace the infection path of malware
A user downloads a free game from an unknown website. Soon after, their computer slows down and shows many pop-up ads. What type of malware is most likely causing this?
Attempts:
2 left
💡 Hint
Think about malware that causes unwanted ads and slows down the computer.
✗ Incorrect
Adware displays unwanted advertisements and can slow down the system. It often comes bundled with free software.
❓ identification
advanced2:00remaining
Identify the threat from a description of its effect
Which threat type secretly records your keystrokes to steal passwords and credit card numbers?
Attempts:
2 left
💡 Hint
This threat spies on your activity without your knowledge.
✗ Incorrect
Spyware secretly monitors user activity like keystrokes to steal sensitive information.
❓ Comparison
expert3:00remaining
Compare malware types by their main goal
Match each threat to its primary goal:
1. Ransomware
2. Phishing
3. Worm
4. Trojan horse
Options:
A. Spread copies of itself to other computers
B. Trick users into revealing sensitive information
C. Lock files and demand payment
D. Disguise as legitimate software to cause harm
1. Ransomware
2. Phishing
3. Worm
4. Trojan horse
Options:
A. Spread copies of itself to other computers
B. Trick users into revealing sensitive information
C. Lock files and demand payment
D. Disguise as legitimate software to cause harm
Attempts:
2 left
💡 Hint
Think about what each threat tries to do: spread, trick, lock, or disguise.
✗ Incorrect
Ransomware locks files and demands payment (C). Phishing tricks users to reveal info (B). Worms spread copies (A). Trojan horses disguise as legit software (D).