Cyber Threats Beginner Quiz 3
Select your answers and check your results. Use Reset to start again.
Search
Practice Pronunciation (Merriam-Webster)
Navigation
IP Addressing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Address Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
IP Addressing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Web Protocols Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Encryption️ Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cloud Computing Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Beginner Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Intermediate Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Network Security Advanced Quizzes
Quiz 1,
Quiz 2,
Quiz 3,
Quiz 4,
Quiz 5
Cyber Threats Beginner Quiz 3
1. What is "Smishing"?
A type of fish that eats computer parts
A phishing attack carried out through SMS (text) messages
Making a program run slower to save battery
2. What is "Vishing"?
A phishing attack carried out over a phone call or voice
A computer mouse shaped like a bird's nest
Using a very large monitor to see more info
3. What is a "Worm" in cybersecurity?
A physical insect that crawls inside a server
A cable used to connect to a very old printer
Malware that replicates to spread to other computers on a network
4. What is a "Keylogger"?
A person hired to log keys in an office building
Software that records every keystroke made on a keyboard
A tool used to open a locked door without a key
5. What is "Spear Phishing"?
A targeted phishing attack aimed at a specific person or company
Using a wooden pole to hit a computer screen
Catching fish using a specialized electronic spear
6. What is "Whaling"?
An ocean animal protected by international laws
Making a loud noise to scare away a person hacking
A phishing attack aimed at high-level executives
7. What is an "Internal Threat"?
A threat from a person in a different country
A security risk originating from someone within the organization
A program used to scan files on a local drive
8. What is "Eavesdropping" in security?
Unauthorized listening to private conversations or data
Cleaning a roof using a specialized water tool
A game where you hear secrets through a door
9. What is "Dumpster Diving" risk?
Accidentally falling into a trash can while cleaning
Saving money by finding parts in a junkyard
Leaving documents with personal info in the trash
10. What is "Social Media Privacy"?
Deleting your account so no one can talk to you
Controlling who can see your personal info and posts
Using a fake name so friends don't find you
Previous
Check Quiz
Reset
Next
Other
Timer
00:00
Start
Stop
Reset
Vocabulary Quiz
Score: 0
Reset Score
Submit Answer
Next Word
Spin the Wheel
SPIN
Promo's
Explore More
Cisco Certifications
Cisco Learning Network