T4Tutorials .PK

Types of Cyber Attacks

1. : Which of the following is a type of cyber attack where attackers send fake emails to trick users into giving sensitive information?

(A) Malware


(B) Phishing


(C) DDoS


(D) SQL Injection




2. : A virus, worm, and trojan horse are examples of:

(A) Spyware


(B) Social Engineering


(C) Malware


(D) Ransomware




3. : In a Denial of Service (DoS) attack, the attacker’s goal is to:

(A) Steal money from banks


(B) Encrypt files for ransom


(C) Overload a system to make it unavailable


(D) Delete all data permanently




4. : Which attack involves locking or encrypting a victim’s files and demanding payment?

(A) Keylogging


(B) Ransomware


(C) Spyware


(D) Rootkit




5. : Which of the following attacks targets databases by injecting malicious queries?

(A) Phishing


(B) Brute Force


(C) SQL Injection


(D) DoS Attack




6. : A Distributed Denial of Service (DDoS) attack is different from DoS because:

(A) It uses multiple computers or bots to launch the attack


(B) It targets only small websites


(C) It always steals passwords


(D) It works without the internet




7. : Which attack records every keystroke made by a user to steal information?

(A) Keylogging


(B) Phishing


(C) Spoofing


(D) Ransomware




8. : Spoofing attacks involve:

(A) Faking an identity such as IP address, email, or website to trick users


(B) Encrypting all user files


(C) Deleting operating systems


(D) Flooding a system with traffic




9. : Which cyber attack secretly monitors user activity and collects data without consent?

(A) Spyware


(B) Worm


(C) SQL Injection


(D) Rootkit




10. : A brute force attack is used to:

(A) Guess passwords by trying many possible combinations


(B) Flood a website with traffic


(C) Inject malicious code into apps


(D) Spy on user activity




Exit mobile version