Cybersecurity Quiz Level #1 Welcome to your Cybersecurity Quiz Level #1 What is a social engineering attack? A) A type of cyber attack that involves tricking people into revealing sensitive information C) A type of cyber attack that involves stealing data from a computer or network D) A type of cyber attack that involves exploiting vulnerabilities in a computer or network B) A type of cyber attack that involves taking control of a computer or network None What is a malware? A) A type of software that blocks unauthorized access to a computer or network B) A type of software that protects against viruses and malware C) A type of software that is designed to damage or disrupt a computer or network D) A type of software that is used to steal data from a computer or network None What is phishing? A) A type of malware that infects a computer through a malicious email attachment B) A type of cyber attack that involves tricking people into revealing sensitive information D) A type of cyber attack that involves stealing data from a computer or network C) A type of cyber attack that involves taking control of a computer or network None What is a strong password? B) A password that contains only numbers D) A password that is long and contains a combination of letters, numbers, and symbols A) A password that contains only lowercase letters C) A password that is easy to remember None What is a botnet? A) A type of cyber attack that involves tricking people into revealing sensitive information D) A network of compromised computers that are controlled by a single entity B) A type of cyber attack that involves taking control of a computer or network C) A type of cyber attack that involves stealing data from a computer or network None What is a virus? B) A type of malware that is hidden within a legitimate program or file A) A type of malware that infects a computer through a malicious email attachment D) All of the above C) A type of malware that is transmitted through removable media, such as a USB drive None What is a zero-day vulnerability? D) A vulnerability that can only be exploited by advanced hackers C) A vulnerability that has not yet been discovered by the software vendor or any other party B) A vulnerability that has been discovered but has not yet been patched by the software vendor A) A vulnerability that has been known and patched by the software vendor None What is a firewall? C) A type of hardware that encrypts data transmitted over a network D) A type of hardware that prevents unauthorized access to a computer or network B) A type of software that protects against viruses and malware A) A type of software that blocks unauthorized access to a computer or network None What is a ransomware? D) A type of malware that is transmitted through removable media, such as a USB drive C) A type of malware that is hidden within a legitimate program or file A) A type of malware that infects a computer through a malicious email attachment B) A type of malware that encrypts a victim's files and demands a ransom to decrypt them None What is two-factor authentication (2FA)? C) A security measure that requires a user to enter a password and a security code generated by a security token B) A security measure that requires a user to enter a password and a security code sent to their phone A) A security measure that requires a user to enter a password and a security code sent to their email D) A security measure that requires a user to enter a password and a security code generated by a fingerprint scanner None Time's upTime is Up!