Cybersecurity Quiz Level #1 Welcome to your Cybersecurity Quiz Level #1 What is phishing? D) A type of cyber attack that involves stealing data from a computer or network A) A type of malware that infects a computer through a malicious email attachment C) A type of cyber attack that involves taking control of a computer or network B) A type of cyber attack that involves tricking people into revealing sensitive information None What is a ransomware? C) A type of malware that is hidden within a legitimate program or file A) A type of malware that infects a computer through a malicious email attachment B) A type of malware that encrypts a victim's files and demands a ransom to decrypt them D) A type of malware that is transmitted through removable media, such as a USB drive None What is a malware? B) A type of software that protects against viruses and malware D) A type of software that is used to steal data from a computer or network C) A type of software that is designed to damage or disrupt a computer or network A) A type of software that blocks unauthorized access to a computer or network None What is two-factor authentication (2FA)? D) A security measure that requires a user to enter a password and a security code generated by a fingerprint scanner C) A security measure that requires a user to enter a password and a security code generated by a security token A) A security measure that requires a user to enter a password and a security code sent to their email B) A security measure that requires a user to enter a password and a security code sent to their phone None What is a social engineering attack? A) A type of cyber attack that involves tricking people into revealing sensitive information C) A type of cyber attack that involves stealing data from a computer or network D) A type of cyber attack that involves exploiting vulnerabilities in a computer or network B) A type of cyber attack that involves taking control of a computer or network None What is a virus? A) A type of malware that infects a computer through a malicious email attachment B) A type of malware that is hidden within a legitimate program or file D) All of the above C) A type of malware that is transmitted through removable media, such as a USB drive None What is a firewall? D) A type of hardware that prevents unauthorized access to a computer or network B) A type of software that protects against viruses and malware C) A type of hardware that encrypts data transmitted over a network A) A type of software that blocks unauthorized access to a computer or network None What is a botnet? B) A type of cyber attack that involves taking control of a computer or network C) A type of cyber attack that involves stealing data from a computer or network A) A type of cyber attack that involves tricking people into revealing sensitive information D) A network of compromised computers that are controlled by a single entity None What is a zero-day vulnerability? B) A vulnerability that has been discovered but has not yet been patched by the software vendor D) A vulnerability that can only be exploited by advanced hackers A) A vulnerability that has been known and patched by the software vendor C) A vulnerability that has not yet been discovered by the software vendor or any other party None What is a strong password? C) A password that is easy to remember B) A password that contains only numbers D) A password that is long and contains a combination of letters, numbers, and symbols A) A password that contains only lowercase letters None Time's upTime is Up!