Skip to content
3D-LABS
We Are Engineers, Researchers, Designers, Developers and Consultants
Home
Services
Career
Contact
Investors
Home
Services
Career
Contact
Investors
Cyber Threat Quiz
Quiz o Clock
Which of the following is a common type of phishing attack?
A. SQL Injection
B. Spear Phishing
C.Denial of Service
D. Man-in-the-Middle
What is the primary goal of a Denial-of-Service (DoS) attack?
A. To steal sensitive information
B. To disrupt normal traffic of a targeted server
C. To modify data on the target server
D. To install malware on the target system
Which malware type encrypts a victim's files and demands payment for the decryption key?
A. Trojan Horse
B. Spyware
C.Ransomware
D. Adware
What is a zero-day vulnerability?
A. A vulnerability that has been known for years
B. A vulnerability that has no existing patch
C. A vulnerability that is actively exploited before the vendor knows about it
D. A vulnerability that affects hardware only
What does the term "social engineering" refer to in cybersecurity?
A. The study of human behavior in online environments
B. The use of algorithms to predict cyber attacks
C. The manipulation of people to divulge confidential information
D. The creation of social networks for secure communication
Which type of attack involves intercepting and altering communication between two parties without them knowing?
A. Brute force attack
B. Phishing attack
C. Man-in-the-Middle attack
D. Keylogging attack
What is the main purpose of a firewall?
A. To block unauthorized access to or from a private network
B. To monitor network traffic
C. To encrypt data
D. To perform regular backups
Which of the following is a common method used by attackers to bypass security controls?
A. Using strong passwords
B. Security patches
C. Privilege escalation
D. Two-factor authentication
What is a botnet?
A.A network of computers used for mining cryptocurrencies
B. A network of compromised computers controlled by an attacker
C. A type of network security device
D. A method of encrypting communication
Which attack exploits vulnerabilities in software to gain unauthorized access or privileges?
A. Social engineering
B.Phishing
C. Spoofing
D. Exploit
Score card
Take Retest
Done
Close