Your browser either does not support JavaScript or you have turned JavaScript off.

Cyber Security Knowledge Quiz

Cyber Security Knowledge Quiz

Question 1 of 6

1. A hacker locks out users and encrypts their personal computer files and data, holding it hostage until they agree to pay to the attacker. What is this practice called?
Wrong. A browser hijacker is a form of malware that changes web browser settings and redirects the user's browser to websites the user had not intended to visit. (source: SearchSecurity)
Correct! The most infamous outbreak of ransomware is Wannacry, which swept through systems globally in May 2017. In total, more than 4,000 ransomware attacks occur daily, representing an increase of over 300 percent since 2015 (source: FBI).
Sorry! A brute force attack describes a trial-and-error method of obtaining information such as a user password or personal identification number (PIN). (source: techopedia)

Question 2 of 6

2. On the evening news you heard the reporter talking about an Internet threat called a 'Botnet'. What exactly is a Botnet?
Wrong. This describes a rootkit.
Correct! Attackers use botnets consisting of thousands or more of computers to perform a variety of malicious tasks, usually targeting systems that are not safeguarded with firewalls and/or anti-virus software.
Sorry. This is not the correct answer.

Question 3 of 6

3. This type of attack is designed to hinder the normal operation of a website, or other network resource.
Correct. If the requests come from multiple sources, it is a DDoS (Distributed-Denial-of-Service) attack.
Incorrect. Point-of-Sale Malware is malicious software designed to steal customer payment data — particularly credit card details — from business checkout systems. (source: FraudWatch International)
Incorrect. Phishing refers to type of a cyber-attack that attempts to trick users into voluntarily sharing personal information through emails, fake websites, pop-up advertisements, and other tricks. A recent phishing attack targeted the mobile messaging app Snapchat, causing over 55,000 users' account information to be exposed on a public website. (source: The Verge)

Question 4 of 6

4. Which of the following is a common example of a "phishing" attack?

You're partially right (all these answers describe potential phishing attacks).

You're partially right (all these answers describe potential phishing attacks).

You're partially right (all these answers describe potential phishing attacks).

Question 5 of 6

5. You are on a business trip and sitting in the local cafe trying to send emails to your colleagues to catch up on a few tasks.

To protect your communications over these public networks you should always do the following:


Wrong. Free public networks often use unencrypted connections, making users easy targets for hackers trying to steal personal information and posing other threats, such as infecting your system with malware.

This is partially correct. Turning off file sharing will keep other devices connected to the network from accessing your files, but will not protect your communication over the network from other threats.
Correct! A VPN allows a company to leverage Internet resources, enabling employees to easily collaborate from various locations, including home.

Question 6 of 6

6. You are attending a business gathering with people discussing GDPR, the new European General Data Protection Regulation that goes into effect this May. Which of the following statements is true about GDPR?

Wrong. GDPR will affect firms both inside and outside of the EU. In fact, any company dealing with EU businesses will have to comply with the new regulations. (source: GDPR & Beyond) GDPR's impact is likely to reach beyond the EU as it influences other global security standards going forward.

Correct! In the event of a data breach, GDPR forces companies to inform relevant authorities within 72 hours and to provide full details of the breach, while proposing measures for mitigating its effects. Therefore, a comprehensive data security strategy is now more important than ever.
Wrong. Under GDPR, organizations in breach of the regulations can be fined up to 4% of their annual global turnover or € 20 million (whichever is greater). (source: GDPREU.org)

You answered of 6 questions correctly

It is never too late to increase your security awareness.

Here are some helpful links to get you started:

To see all the quiz questions and their correct answers, please click here.

Some questions are trickier than you think. Learn from your errors to prepare for future cyber challenges.

Here are some materials you may find useful:

To see all the quiz questions and their correct answers, please click here.

You are a cyber security expert! But, hackers will never curtail their activities, so stay aware of security news and trends.

To see all the quiz questions and their correct answers, please click here.