Page 1 of 2

Quiz: Common cybersecurity attacks

1. What is the primary reason behind launching cyberattacks?

1. What is the primary reason behind launching cyberattacks?
A
B
C
D

2. How often do cyberattacks occur, according to the report by the University of Maryland?

2. How often do cyberattacks occur, according to the report by the University of Maryland?
A
B
C
D

3. Which of the following is NOT an example of a cyberattack?

3. Which of the following is NOT an example of a cyberattack?
A
B
C
D

4. What type of attack involves flooding a server or network with excessive internet traffic?

4. What type of attack involves flooding a server or network with excessive internet traffic?
A
B
C
D

5. Which of the following attacks targets vulnerable IoT devices by exploiting default passwords and insecure configurations?

5. Which of the following attacks targets vulnerable IoT devices by exploiting default passwords and insecure configurations?
A
B
C
D

6. What type of attack involves tricking victims into revealing sensitive information through fraudulent emails, websites, or messages?

6. What type of attack involves tricking victims into revealing sensitive information through fraudulent emails, websites, or messages?
A
B
C
D

7. Which attack targets the elements in the software supply chain, introducing malicious code or vulnerabilities into legitimate software or hardware components?

7. Which attack targets the elements in the software supply chain, introducing malicious code or vulnerabilities into legitimate software or hardware components?
A
B
C
D

8. What is the recommended mitigation strategy against zero-day exploits?

8. What is the recommended mitigation strategy against zero-day exploits?
A
B
C
D

9. Which type of attack involves intercepting and taking control of an established user session, allowing attackers to impersonate the victim?

9. Which type of attack involves intercepting and taking control of an established user session, allowing attackers to impersonate the victim?
A
B
C
D

10. What is the recommended approach to defend against diverse cybersecurity threats?

10. What is the recommended approach to defend against diverse cybersecurity threats?
A
B
C
D
Never submit passwords through Tally forms.
Report malicious form