Cyber Threats Quiz: Malware, Phishing u0026 DDoS Essentials Quiz

Explore key concepts related to common internet cyber threats including malware, phishing attacks, and DDoS incidents. This quick quiz helps you understand basic definitions, risks, and safety measures to recognize and avoid digital dangers online.

  1. Recognizing Malware

    Which term describes software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system?

    1. Malware
    2. Firewall
    3. Cookie
    4. Scriptware

    Explanation: Malware refers to harmful software created with the intent to cause damage or gain unauthorized access. A firewall is a security system, not malicious software. Cookies are small text files used for website tracking, which are not inherently harmful. 'Scriptware' is not a standard term in cybersecurity. Only 'malware' accurately fits the description.

  2. Understanding Phishing

    In a phishing attack, which of the following do cybercriminals often use to trick users into revealing confidential information?

    1. Fake emails
    2. Encrypted messages
    3. Backup drives
    4. Strong passwords

    Explanation: Fake emails are a primary tool used in phishing attacks to deceive users into sharing personal data. Encrypted messages are designed to protect information. Backup drives store data and are not a method of trickery. Strong passwords help protect against cyber threats but aren't part of the attacker's toolkit. Only fake emails directly relate to phishing attempts.

  3. DDoS Attack Basics

    What does a Distributed Denial-of-Service (DDoS) attack aim to do to a targeted website or online service?

    1. Encrypt all files
    2. Steal login credentials
    3. Improve its loading speed
    4. Overwhelm it with traffic

    Explanation: A DDoS attack floods a target with excessive traffic, causing it to slow down or crash. DDoS attacks do not typically attempt to steal logins or encrypt data. Improving loading speed is the opposite of the attack's intent. Only the correct choice matches the purpose of a DDoS attack.

  4. Malware Infection Example

    If a user unknowingly installs software that secretly logs their keystrokes, what type of malware has most likely infected their system?

    1. Keylogger
    2. Rootkit
    3. Backupware
    4. Adware

    Explanation: A keylogger is malware designed to record keystrokes covertly. Adware typically shows unwanted advertisements rather than recording input. Rootkits hide malicious activities but do not specifically log keystrokes. 'Backupware' is not a recognized term for malware. The correct answer is keylogger.

  5. Identifying Phishing Signs

    Which sign can help you identify a phishing website pretending to be a legitimate login page?

    1. Unusual web address
    2. Fast loading time
    3. Customized greeting
    4. Correct logo

    Explanation: An unusual or suspicious web address often indicates a phishing site. A customized greeting and correct logo may be copied from real websites, misleading the user. Fast loading time does not determine website legitimacy. Only an odd web address is a clear warning sign.

  6. Ransomware Behavior

    What does ransomware typically do once it has infected a user's device?

    1. Speeds up performance
    2. Installs updates
    3. Deletes passwords
    4. Encrypts files

    Explanation: Ransomware encrypts files and demands payment for their release. It does not delete passwords specifically, speed up the device, or install updates. These other actions either do not align with the intent or are unrelated to ransomware. Encryption of files is its main characteristic.

  7. DDoS Botnet Role

    Which role do 'botnets' typically play in carrying out a DDoS attack?

    1. They block spam emails
    2. They remove malware
    3. They backup user data
    4. They control many infected devices

    Explanation: Botnets consist of networks of compromised devices used to launch DDoS attacks by sending excessive traffic. Botnets do not block spam, backup data, or remove malware. Those are defensive or maintenance tasks, not attack functions. The correct answer describes how botnets multiply attack power.

  8. Safe Web Links

    What is a recommended practice to avoid clicking on malicious links in your email?

    1. Ignore all links entirely
    2. Only open emails at midnight
    3. Click links quickly to avoid detection
    4. Hover over links to check the actual URL

    Explanation: Hovering lets you view the actual destination of a link before clicking, helping to spot suspicious URLs. Clicking links quickly does not prevent threats and can expose you to danger. Ignoring all links is impractical, while opening emails at midnight offers no security benefits. The correct method improves safety.

  9. Types of Malware

    Which type of malware is mainly designed to display unwanted advertisements on your device?

    1. Scamware
    2. Spyware
    3. Adware
    4. Worm

    Explanation: Adware's primary purpose is to show unwanted ads. Spyware is used to gather user information without consent. Worms are self-replicating programs that spread but do not primarily serve ads. 'Scamware' is not a standard term for describing this type of malware. The correct answer is adware.

  10. Protective Measures

    Which simple action can help protect against phishing attempts on social media?

    1. Accept every friend request
    2. Post passwords publicly
    3. Click random links
    4. Avoid sharing personal information

    Explanation: Not sharing personal details limits what phishers can exploit. Clicking random links, accepting all friend requests, or posting passwords increases vulnerability. These distractor options actually raise risk rather than protect you. Only the correct choice suggests a safe habit.