Explore key concepts related to common internet cyber threats including malware, phishing attacks, and DDoS incidents. This quick quiz helps you understand basic definitions, risks, and safety measures to recognize and avoid digital dangers online.
Which term describes software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system?
Explanation: Malware refers to harmful software created with the intent to cause damage or gain unauthorized access. A firewall is a security system, not malicious software. Cookies are small text files used for website tracking, which are not inherently harmful. 'Scriptware' is not a standard term in cybersecurity. Only 'malware' accurately fits the description.
In a phishing attack, which of the following do cybercriminals often use to trick users into revealing confidential information?
Explanation: Fake emails are a primary tool used in phishing attacks to deceive users into sharing personal data. Encrypted messages are designed to protect information. Backup drives store data and are not a method of trickery. Strong passwords help protect against cyber threats but aren't part of the attacker's toolkit. Only fake emails directly relate to phishing attempts.
What does a Distributed Denial-of-Service (DDoS) attack aim to do to a targeted website or online service?
Explanation: A DDoS attack floods a target with excessive traffic, causing it to slow down or crash. DDoS attacks do not typically attempt to steal logins or encrypt data. Improving loading speed is the opposite of the attack's intent. Only the correct choice matches the purpose of a DDoS attack.
If a user unknowingly installs software that secretly logs their keystrokes, what type of malware has most likely infected their system?
Explanation: A keylogger is malware designed to record keystrokes covertly. Adware typically shows unwanted advertisements rather than recording input. Rootkits hide malicious activities but do not specifically log keystrokes. 'Backupware' is not a recognized term for malware. The correct answer is keylogger.
Which sign can help you identify a phishing website pretending to be a legitimate login page?
Explanation: An unusual or suspicious web address often indicates a phishing site. A customized greeting and correct logo may be copied from real websites, misleading the user. Fast loading time does not determine website legitimacy. Only an odd web address is a clear warning sign.
What does ransomware typically do once it has infected a user's device?
Explanation: Ransomware encrypts files and demands payment for their release. It does not delete passwords specifically, speed up the device, or install updates. These other actions either do not align with the intent or are unrelated to ransomware. Encryption of files is its main characteristic.
Which role do 'botnets' typically play in carrying out a DDoS attack?
Explanation: Botnets consist of networks of compromised devices used to launch DDoS attacks by sending excessive traffic. Botnets do not block spam, backup data, or remove malware. Those are defensive or maintenance tasks, not attack functions. The correct answer describes how botnets multiply attack power.
What is a recommended practice to avoid clicking on malicious links in your email?
Explanation: Hovering lets you view the actual destination of a link before clicking, helping to spot suspicious URLs. Clicking links quickly does not prevent threats and can expose you to danger. Ignoring all links is impractical, while opening emails at midnight offers no security benefits. The correct method improves safety.
Which type of malware is mainly designed to display unwanted advertisements on your device?
Explanation: Adware's primary purpose is to show unwanted ads. Spyware is used to gather user information without consent. Worms are self-replicating programs that spread but do not primarily serve ads. 'Scamware' is not a standard term for describing this type of malware. The correct answer is adware.
Which simple action can help protect against phishing attempts on social media?
Explanation: Not sharing personal details limits what phishers can exploit. Clicking random links, accepting all friend requests, or posting passwords increases vulnerability. These distractor options actually raise risk rather than protect you. Only the correct choice suggests a safe habit.