1) What is the goal of a Denial of Service (DoS) attack? a) To protect a network from malware b) To overload a website or network and disrupt services c) To steal sensitive data d) To monitor user activity 2) How does a Distributed Denial of Service (DDoS) attack differ from a DoS attack? a) It uses multiple systems to attack the target b) It only affects personal devices c) It can only be launched from mobile devices d) It encrypts data before launching an attack 3) What is a Trojan horse? a) A program disguised as legitimate software but installs malware b) A self-replicating malicious program c) A malicious network protocol d) A hardware vulnerability 4) How can you identify a secure website for entering sensitive information? a) The URL starts with "http://" b) The site has frequent pop-up ads c) The URL starts with "https://" d) The website has a colorful design 5) Which malware type specifically tracks user input like keystrokes? a) worm b) adware c) spyware d) trojan 6) Which of these is NOT a way to protect against malware? a) Using authentic antivirus software b) Updating your operating system regularly c) Clicking on unsolicited email links d) Avoiding downloads from untrusted sources 7) What is a worm in cybersecurity? a) A malicious program that attaches to other software b) A self-replicating program that spreads across systems c) A tool for blocking malware d) A system update mechanism 8) What is malware? a) Hardware designed to secure networks b) Any malicious software that harms a system without the user’s knowledge c) A program to fix vulnerabilities d) A legal monitoring tool 9) What does adware do? a) Protect systems from malware b) Display unwanted advertisements on devices c) Encrypt files for security d) Prevent phishing attacks 10) Spyware is used to: a) Secure data transmissions b) Steal sensitive information without the user’s knowledge c) Block unauthorized access to systems d) Prevent data loss

Leaderboard

Visual style

Options

Switch template

Continue editing: ?