Computer

Types of Cyber Threats & Attacks MCQs with Answers

What is the main characteristic of a Distributed Denial of Service (DDoS) attack?
a) Unauthorized access to data
b) Overloading a system or network with traffic
c) Encrypting data for ransom
d) Intercepting communications

Answer
b) Overloading a system or network with traffic

Which type of attack exploits vulnerabilities in software to gain unauthorized access to a system?
a) Phishing
b) SQL injection
c) Man-in-the-middle
d) Ransomware

Answer
b) SQL injection

What is a common method used in phishing attacks?
a) Encrypting files to demand a ransom
b) Sending fake emails to trick users into revealing personal information
c) Overloading a server with traffic
d) Installing malware without the user’s knowledge

Answer
b) Sending fake emails to trick users into revealing personal information

Which of the following is a type of malware that locks users out of their data and demands payment for access?
a) Trojan horse
b) Ransomware
c) Spyware
d) Adware

Answer
b) Ransomware

What type of cyberattack involves intercepting communications between two parties?
a) DDoS attack
b) Man-in-the-middle attack
c) Keylogging
d) Phishing

Answer
b) Man-in-the-middle attack

Which of the following is the primary goal of a phishing attack?
a) To install malware on a victim’s system
b) To steal personal or financial information
c) To block access to a system or network
d) To damage a system’s hardware

Answer
b) To steal personal or financial information

Which type of attack is designed to exploit weaknesses in a system’s authentication process?
a) Password guessing
b) Brute force attack
c) Man-in-the-middle attack
d) SQL injection

Answer
b) Brute force attack

Which of the following attacks targets a specific individual or organization with personalized malicious content?
a) Phishing
b) Spear phishing
c) Ransomware
d) DDoS

Answer
b) Spear phishing

What is the main objective of a virus in cybersecurity?
a) To steal sensitive data
b) To replicate itself and spread to other systems
c) To block network access
d) To encrypt data for ransom

Answer
b) To replicate itself and spread to other systems

Which attack involves exploiting a website’s vulnerabilities to insert malicious code that is executed when users visit the site?
a) Cross-site scripting (XSS)
b) Cross-site request forgery (CSRF)
c) Phishing
d) Malware injection

Answer
a) Cross-site scripting (XSS)

What type of attack uses a fake Wi-Fi network to intercept communication between a user and a legitimate network?
a) Sniffing
b) Phishing
c) Evil twin attack
d) DDoS

Answer
c) Evil twin attack

Which of the following attacks typically uses malicious code to take control of a user’s system?
a) Worm
b) Virus
c) Trojan horse
d) Spyware

Answer
c) Trojan horse

What is the primary goal of a DoS (Denial of Service) attack?
a) To steal data from a system
b) To prevent access to a system or network
c) To install malware on a system
d) To harvest credentials from users

Answer
b) To prevent access to a system or network

Which type of attack targets a specific system to exploit a known vulnerability before the system owner has applied the patch?
a) Zero-day attack
b) Brute force attack
c) DDoS attack
d) Phishing attack

Answer
a) Zero-day attack

What is the objective of a SQL injection attack?
a) To steal personal information via email
b) To overload a server with traffic
c) To exploit vulnerabilities in a website’s database
d) To intercept and read encrypted communications

Answer
c) To exploit vulnerabilities in a website’s database

Which of the following refers to software designed to gather information about a user without their knowledge?
a) Malware
b) Spyware
c) Worms
d) Ransomware

Answer
b) Spyware

What is a key difference between a virus and a worm?
a) A virus requires a host program to replicate, while a worm can self-replicate
b) A worm is less harmful than a virus
c) A virus is only found on websites, while a worm is spread through email
d) A worm requires user interaction to activate, while a virus does not

Answer
a) A virus requires a host program to replicate, while a worm can self-replicate

Which of the following is a type of attack where an attacker sends large amounts of data to a server in an attempt to overload it?
a) SQL injection
b) Phishing
c) Denial of Service (DoS)
d) Trojan horse

Answer
c) Denial of Service (DoS)

What is a keyloggers’ primary function in a cyberattack?
a) To encrypt files for ransom
b) To capture keystrokes and record sensitive data
c) To intercept network traffic
d) To gain unauthorized access to email accounts

Answer
b) To capture keystrokes and record sensitive data

What type of malware is used to gain unauthorized access to a system by tricking the user into installing it?
a) Trojan horse
b) Worm
c) Adware
d) Ransomware

Answer
a) Trojan horse

Which of the following attacks attempts to overwhelm a network by sending too much traffic to a server, causing it to crash?
a) Phishing
b) Man-in-the-middle attack
c) Distributed Denial of Service (DDoS)
d) Keylogging

Answer
c) Distributed Denial of Service (DDoS)

Which of the following terms refers to the act of intercepting and altering communication between two parties?
a) Phishing
b) Man-in-the-middle attack
c) SQL injection
d) Cross-site scripting

Answer
b) Man-in-the-middle attack

Which type of attack involves sending fraudulent communication from a trusted source, often to trick a victim into revealing personal information?
a) Phishing
b) Worm
c) Keylogging
d) Cross-site scripting

Answer
a) Phishing

What is the goal of a credential stuffing attack?
a) To flood a website with traffic
b) To steal confidential data by guessing passwords
c) To gain unauthorized access by using stolen login credentials
d) To intercept email communications

Answer
c) To gain unauthorized access by using stolen login credentials

Which type of cyberattack uses malicious code to disrupt the operations of critical infrastructure or systems?
a) Ransomware
b) Advanced Persistent Threat (APT)
c) Man-in-the-middle attack
d) Phishing

Answer
b) Advanced Persistent Threat (APT)

What is the main purpose of a cross-site request forgery (CSRF) attack?
a) To trick users into executing unauthorized actions on websites
b) To overload servers with requests
c) To steal login credentials
d) To inject malicious code into web forms

Answer
a) To trick users into executing unauthorized actions on websites

Which attack involves injecting malicious code into a website, which is then executed by unsuspecting users?
a) Cross-site scripting (XSS)
b) DDoS attack
c) Phishing
d) Man-in-the-middle attack

Answer
a) Cross-site scripting (XSS)

Which type of attack is designed to exploit a vulnerability in a system before the organization can fix it?
a) Zero-day attack
b) Phishing attack
c) SQL injection
d) Brute force attack

Answer
a) Zero-day attack

What is the main purpose of a DNS Spoofing attack?
a) To trick users into visiting malicious websites
b) To encrypt data for ransom
c) To intercept communications between two parties
d) To overload a server with traffic

Answer
a) To trick users into visiting malicious websites

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button