Are You a Cyber Security Expert?

A piece of code that has the ability to duplicate itself, typically with the result of destroying data or damaging the system is called a . . .
Trojan
Virus
Dropper
What type of malware locks the victim out of their files and demands payment for them in return?
Spyware
Adware
Ransomware
What characters should be used to create a strong password? (Select all that apply)
Uppercase Letters
Lowercase Letters
Numbers
Special Characters
A request for information appearing to be from a familiar third-party company (often through email) is called . . .
Spam
Phishing
DNS Spoofing
There is no risk in downloading a web browser extension that appears to be legitimate.
True
False
Which of these techniques do spear phishers often use?
Pharming
Targeted Emails
Encryption
A group of computers running malware under the control of a hacker is called a . . .
Botnet
Backdoor
Cryptosystem
A company will always know when they have a virus.
True
False
Which of these are common features of a phishing scam? (Select all that apply)
Spelling or grammar errors
Bad return address
They request personal information
You won a contest you never entered
What is the most effective way to protect your employees from an attack?
Detailed security training
Strong anti-virus software
Consulting cyber security professionals
All of the above
{"name":"Are You a Cyber Security Expert?", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"A piece of code that has the ability to duplicate itself, typically with the result of destroying data or damaging the system is called a . . ., What type of malware locks the victim out of their files and demands payment for them in return?, What characters should be used to create a strong password? (Select all that apply)","img":"https://cdn.poll-maker.com/22-864768/cybersecurity-room.png?sz=1200-00344000000940605300"}
Powered by: Quiz Maker