Types of Cyber Attacks
Malware
Security Method
Cyber Attack Impact
100

What is DDoS attack?

A Distributed Denial of Service (DDoS) attack is an attempt to make a service unavailable by overwhelming it with traffic from multiple sources.

100

What is Malware?

general term for any software designed to cause harm, steal data, or disrupt systems.

100

2FA stands for?

Two Factor Authentication

100

What are the potential impacts of a cyber attack?

data loss, financial loss, reputational damage, operational disruption, and legal consequences.

200

The potential consequence of DDoS?

Slow or completely unavailable to regular users

200

Common types of Malware?

viruses, worms, ransomware, spyware, adware, and trojans.

200

one advantage of Biometric verification?

provides a high level of security as it uses unique physical characteristics (like fingerprints or facial recognition) that are hard to replicate

200

What is meant by data breach?

refers to an incident where unauthorized access is gained to sensitive, protected, or confidential data.

300

How Ransomware works?

It makes file in accessible by locking or encryption and demands money to decrypt.

300

How does Malware typically spread?

through infected email attachments, malicious downloads, compromised websites, or removable media like USB drives.

300

How does 2FA works?

Something you know (Password)

Something you have (phone, card)

Something you are(fingerprint, facial recognition)

300

How can cyber attacks affect businesses?

significant financial losses, loss of customer trust, legal issues, and disruptions in operations.

400

How spyware operates?

It secretly monitors user activity, collecting personal information and sending it to third parties without the user's consent.

400

Main difference between Virus and Malware?

Malware: A general term for any software designed to cause harm, steal data, or disrupt systems.

Virus: A specific type of malware that self-replicates by attaching its code to other files or programs.

400

What does 2FA ensures?

one factor is compromised, hacker still need 2nd factor to gain access.

400

What is the benefit of cybersecurity measure?

Helps protecting the security and privacy risks 

500

Data corrupt or crashing the system is caused by which type of cyber-attack?

Virus


500

What is Keylogger?

software that records every keystroke made by the user, often used to capture sensitive information like password

500

How bio metric is convenient?

Eliminates the need of of password, PINs

500

Common sign that your computer is hacked?

Passwords not working

Accounts are locked

Emails sent from account

Missing files, rename or encrypted

M
e
n
u