Computer

Types of Cyber Threats & Attacks MCQs with Answers

What is the main characteristic of a Distributed Denial of Service (DDoS) attack?
a) Unauthorized access to data
b) Overloading a system or network with traffic
c) Encrypting data for ransom
d) Intercepting communications

Which type of attack exploits vulnerabilities in software to gain unauthorized access to a system?
a) Phishing
b) SQL injection
c) Man-in-the-middle
d) Ransomware

What is a common method used in phishing attacks?
a) Encrypting files to demand a ransom
b) Sending fake emails to trick users into revealing personal information
c) Overloading a server with traffic
d) Installing malware without the user’s knowledge

Which of the following is a type of malware that locks users out of their data and demands payment for access?
a) Trojan horse
b) Ransomware
c) Spyware
d) Adware

What type of cyberattack involves intercepting communications between two parties?
a) DDoS attack
b) Man-in-the-middle attack
c) Keylogging
d) Phishing

Which of the following is the primary goal of a phishing attack?
a) To install malware on a victim’s system
b) To steal personal or financial information
c) To block access to a system or network
d) To damage a system’s hardware

Which type of attack is designed to exploit weaknesses in a system’s authentication process?
a) Password guessing
b) Brute force attack
c) Man-in-the-middle attack
d) SQL injection

Which of the following attacks targets a specific individual or organization with personalized malicious content?
a) Phishing
b) Spear phishing
c) Ransomware
d) DDoS

What is the main objective of a virus in cybersecurity?
a) To steal sensitive data
b) To replicate itself and spread to other systems
c) To block network access
d) To encrypt data for ransom

Which attack involves exploiting a website’s vulnerabilities to insert malicious code that is executed when users visit the site?
a) Cross-site scripting (XSS)
b) Cross-site request forgery (CSRF)
c) Phishing
d) Malware injection

What type of attack uses a fake Wi-Fi network to intercept communication between a user and a legitimate network?
a) Sniffing
b) Phishing
c) Evil twin attack
d) DDoS

Which of the following attacks typically uses malicious code to take control of a user’s system?
a) Worm
b) Virus
c) Trojan horse
d) Spyware

What is the primary goal of a DoS (Denial of Service) attack?
a) To steal data from a system
b) To prevent access to a system or network
c) To install malware on a system
d) To harvest credentials from users

Which type of attack targets a specific system to exploit a known vulnerability before the system owner has applied the patch?
a) Zero-day attack
b) Brute force attack
c) DDoS attack
d) Phishing attack

What is the objective of a SQL injection attack?
a) To steal personal information via email
b) To overload a server with traffic
c) To exploit vulnerabilities in a website’s database
d) To intercept and read encrypted communications

Which of the following refers to software designed to gather information about a user without their knowledge?
a) Malware
b) Spyware
c) Worms
d) Ransomware

What is a key difference between a virus and a worm?
a) A virus requires a host program to replicate, while a worm can self-replicate
b) A worm is less harmful than a virus
c) A virus is only found on websites, while a worm is spread through email
d) A worm requires user interaction to activate, while a virus does not

Which of the following is a type of attack where an attacker sends large amounts of data to a server in an attempt to overload it?
a) SQL injection
b) Phishing
c) Denial of Service (DoS)
d) Trojan horse

What is a keyloggers’ primary function in a cyberattack?
a) To encrypt files for ransom
b) To capture keystrokes and record sensitive data
c) To intercept network traffic
d) To gain unauthorized access to email accounts

What type of malware is used to gain unauthorized access to a system by tricking the user into installing it?
a) Trojan horse
b) Worm
c) Adware
d) Ransomware

Which of the following attacks attempts to overwhelm a network by sending too much traffic to a server, causing it to crash?
a) Phishing
b) Man-in-the-middle attack
c) Distributed Denial of Service (DDoS)
d) Keylogging

Which of the following terms refers to the act of intercepting and altering communication between two parties?
a) Phishing
b) Man-in-the-middle attack
c) SQL injection
d) Cross-site scripting

Which type of attack involves sending fraudulent communication from a trusted source, often to trick a victim into revealing personal information?
a) Phishing
b) Worm
c) Keylogging
d) Cross-site scripting

What is the goal of a credential stuffing attack?
a) To flood a website with traffic
b) To steal confidential data by guessing passwords
c) To gain unauthorized access by using stolen login credentials
d) To intercept email communications

Which type of cyberattack uses malicious code to disrupt the operations of critical infrastructure or systems?
a) Ransomware
b) Advanced Persistent Threat (APT)
c) Man-in-the-middle attack
d) Phishing

What is the main purpose of a cross-site request forgery (CSRF) attack?
a) To trick users into executing unauthorized actions on websites
b) To overload servers with requests
c) To steal login credentials
d) To inject malicious code into web forms

Which attack involves injecting malicious code into a website, which is then executed by unsuspecting users?
a) Cross-site scripting (XSS)
b) DDoS attack
c) Phishing
d) Man-in-the-middle attack

Which type of attack is designed to exploit a vulnerability in a system before the organization can fix it?
a) Zero-day attack
b) Phishing attack
c) SQL injection
d) Brute force attack

What is the main purpose of a DNS Spoofing attack?
a) To trick users into visiting malicious websites
b) To encrypt data for ransom
c) To intercept communications between two parties
d) To overload a server with traffic

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button