Types of Cyber Threats & Attacks MCQs with Answers
What is the main characteristic of a Distributed Denial of Service (DDoS) attack?
a) Unauthorized access to data
b) Overloading a system or network with traffic
c) Encrypting data for ransom
d) Intercepting communications
Which type of attack exploits vulnerabilities in software to gain unauthorized access to a system?
a) Phishing
b) SQL injection
c) Man-in-the-middle
d) Ransomware
What is a common method used in phishing attacks?
a) Encrypting files to demand a ransom
b) Sending fake emails to trick users into revealing personal information
c) Overloading a server with traffic
d) Installing malware without the user’s knowledge
Which of the following is a type of malware that locks users out of their data and demands payment for access?
a) Trojan horse
b) Ransomware
c) Spyware
d) Adware
What type of cyberattack involves intercepting communications between two parties?
a) DDoS attack
b) Man-in-the-middle attack
c) Keylogging
d) Phishing
Which of the following is the primary goal of a phishing attack?
a) To install malware on a victim’s system
b) To steal personal or financial information
c) To block access to a system or network
d) To damage a system’s hardware
Which type of attack is designed to exploit weaknesses in a system’s authentication process?
a) Password guessing
b) Brute force attack
c) Man-in-the-middle attack
d) SQL injection
Which of the following attacks targets a specific individual or organization with personalized malicious content?
a) Phishing
b) Spear phishing
c) Ransomware
d) DDoS
What is the main objective of a virus in cybersecurity?
a) To steal sensitive data
b) To replicate itself and spread to other systems
c) To block network access
d) To encrypt data for ransom
Which attack involves exploiting a website’s vulnerabilities to insert malicious code that is executed when users visit the site?
a) Cross-site scripting (XSS)
b) Cross-site request forgery (CSRF)
c) Phishing
d) Malware injection
What type of attack uses a fake Wi-Fi network to intercept communication between a user and a legitimate network?
a) Sniffing
b) Phishing
c) Evil twin attack
d) DDoS
Which of the following attacks typically uses malicious code to take control of a user’s system?
a) Worm
b) Virus
c) Trojan horse
d) Spyware
What is the primary goal of a DoS (Denial of Service) attack?
a) To steal data from a system
b) To prevent access to a system or network
c) To install malware on a system
d) To harvest credentials from users
Which type of attack targets a specific system to exploit a known vulnerability before the system owner has applied the patch?
a) Zero-day attack
b) Brute force attack
c) DDoS attack
d) Phishing attack
What is the objective of a SQL injection attack?
a) To steal personal information via email
b) To overload a server with traffic
c) To exploit vulnerabilities in a website’s database
d) To intercept and read encrypted communications
Which of the following refers to software designed to gather information about a user without their knowledge?
a) Malware
b) Spyware
c) Worms
d) Ransomware
What is a key difference between a virus and a worm?
a) A virus requires a host program to replicate, while a worm can self-replicate
b) A worm is less harmful than a virus
c) A virus is only found on websites, while a worm is spread through email
d) A worm requires user interaction to activate, while a virus does not
Which of the following is a type of attack where an attacker sends large amounts of data to a server in an attempt to overload it?
a) SQL injection
b) Phishing
c) Denial of Service (DoS)
d) Trojan horse
What is a keyloggers’ primary function in a cyberattack?
a) To encrypt files for ransom
b) To capture keystrokes and record sensitive data
c) To intercept network traffic
d) To gain unauthorized access to email accounts
What type of malware is used to gain unauthorized access to a system by tricking the user into installing it?
a) Trojan horse
b) Worm
c) Adware
d) Ransomware
Which of the following attacks attempts to overwhelm a network by sending too much traffic to a server, causing it to crash?
a) Phishing
b) Man-in-the-middle attack
c) Distributed Denial of Service (DDoS)
d) Keylogging
Which of the following terms refers to the act of intercepting and altering communication between two parties?
a) Phishing
b) Man-in-the-middle attack
c) SQL injection
d) Cross-site scripting
Which type of attack involves sending fraudulent communication from a trusted source, often to trick a victim into revealing personal information?
a) Phishing
b) Worm
c) Keylogging
d) Cross-site scripting
What is the goal of a credential stuffing attack?
a) To flood a website with traffic
b) To steal confidential data by guessing passwords
c) To gain unauthorized access by using stolen login credentials
d) To intercept email communications
Which type of cyberattack uses malicious code to disrupt the operations of critical infrastructure or systems?
a) Ransomware
b) Advanced Persistent Threat (APT)
c) Man-in-the-middle attack
d) Phishing
What is the main purpose of a cross-site request forgery (CSRF) attack?
a) To trick users into executing unauthorized actions on websites
b) To overload servers with requests
c) To steal login credentials
d) To inject malicious code into web forms
Which attack involves injecting malicious code into a website, which is then executed by unsuspecting users?
a) Cross-site scripting (XSS)
b) DDoS attack
c) Phishing
d) Man-in-the-middle attack
Which type of attack is designed to exploit a vulnerability in a system before the organization can fix it?
a) Zero-day attack
b) Phishing attack
c) SQL injection
d) Brute force attack
What is the main purpose of a DNS Spoofing attack?
a) To trick users into visiting malicious websites
b) To encrypt data for ransom
c) To intercept communications between two parties
d) To overload a server with traffic