49 Questions
Which factor is NOT driving the growth in cybercrime?
The distributed nature of the Internet
What are some potential targets of data breaches?
All of the above
What percentage of data breaches in 2019 were caused by human error?
90%
What is one way to mitigate unauthorized access to customer data?
All of the above
What is the fastest-growing segment of cybercrime?
Information theft
Which of the following is a common method used by cybercriminals to gain access to sensitive information?
Phishing attacks
What can happen if you click on links or download attachments from a phishing email?
Your login credentials can be stolen
Where does stolen personally identifiable information (PII) typically end up?
On the dark web for sale
Which of the following is a common attack vector for social engineering?
Phishing campaigns
What is the main difference between phishing attacks and other social engineering attacks?
Phishing attacks are deployed via email, while other social engineering attacks can occur in person
What is the purpose of cyber threat intelligence?
To provide a better understanding of cyber threats and identify similarities and differences
Which of the following cyber threats is specifically designed to perform malicious tasks on a device or network, such as corrupting data or taking control of a system?
Malware
What type of cyber threat involves a form of malware that hides on a device providing real-time information sharing to its host, enabling them to steal data like bank details and passwords?
Spyware
Which cyber threat aims to disrupt a computer network by flooding the network with superfluous requests from a botnet to overload the system and prevent legitimate requests from being fulfilled?
Distributed Denial of Service (DDoS) Attacks
Which method do cybercriminals often use to gain access to new login credentials after a data breach?
Phishing
What is the risk of reusing passwords across multiple sites?
Compromising other accounts
What is a cyber attack known as credential stuffing?
Using stolen login credentials from one site to hack into another site
What do cybercriminals do with stolen login credentials after a data breach?
Use them to gain unauthorized access to user accounts
What is the purpose of using old login credentials after a data breach?
To trick users into thinking the account has been hacked
Which of the following is a common form of cyber attack that relies on tricking individuals into revealing sensitive information such as passwords or credit card numbers?
Phishing
What is the purpose of implementing intelligent cloud security solutions alongside strong password policies?
To mitigate unauthorized access
What is the most expensive and fastest-growing segment of cybercrime?
Information theft
What are some potential targets of cyber attacks?
All of the above
What is the easiest form of cyber attack?
Phishing
What is the purpose of the National Institute of Standards and Technology's (NIST) Cybersecurity Framework?
To protect organizations from cyber threats
What is the main goal of social engineering attacks?
To steal personally identifiable information
What is the difference between phishing attacks and other social engineering attacks?
The method of delivery
What is the purpose of cyber threat intelligence?
To analyze cyber threat information
What is the most common attack vector for social engineering?
Phishing campaigns
Which of the following is a common method used by cybercriminals to gain access to sensitive information?
Phishing attacks
What is the risk of reusing passwords across multiple sites?
Increased risk of unauthorized access
What is one way to mitigate unauthorized access to customer data?
All of the above
Where does stolen personally identifiable information (PII) typically end up?
In the dark web for sale
Which cyber threat aims to disrupt a computer network by flooding the network with superfluous requests from a botnet to overload the system and prevent legitimate requests from being fulfilled?
Denial-of-service (DoS) attacks
Which of the following is NOT a potential target of data breaches?
Employee salaries
What is the purpose of using old login credentials after a data breach?
To gain unauthorized access to sensitive information
What can happen if you click on links or download attachments from a phishing email?
All of the above
Where does stolen personally identifiable information (PII) typically end up?
All of the above
What is the risk of reusing passwords across multiple sites?
All of the above
Which type of cyber threat involves a backdoor in your system, allowing the attacker to gain control of your computer or access confidential information?
Trojans
What is the term for a cyber attack when an unauthorized user gains access to a system or network and remains undetected for an extended period of time?
Advanced Persistent Threats
Which cyber threat aims to disrupt a computer network by flooding the network with superfluous requests from a botnet to overload the system and prevent legitimate requests from being fulfilled?
Distributed Denial of Service Attacks
What type of cyber threat involves stealing sensitive information before encrypting the target system?
Ransomware Attacks
Which cyber threat involves a cybercriminal hacking an organization by compromising a third-party vendor in its supply chain?
Supply Chain Attacks
Which of the following methods do cybercriminals often use to gain access to new login credentials after a data breach?
Credential stuffing
What is the risk of reusing passwords across multiple sites?
Compromised accounts
What is the purpose of cyber threat intelligence?
To gather information about potential threats
What is a common attack vector for social engineering?
Phishing emails
What can happen if you click on links or download attachments from a phishing email?
Data loss or malware infection
Test your knowledge on social engineering and phishing attacks with this quiz! Learn about the tactics used by cyber threat actors to manipulate and trick individuals into revealing sensitive information. Enhance your understanding of the different attack vectors, such as phishing campaigns and impersonation, and how to protect yourself from falling victim to these cyber threats.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free