livechat icon

Live Chat Support

Live Online Meeting











Don’t wait any longer. Get started today!


Tech Minutes

Directive has been serving the Oneonta area since 1993, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Well Do You Know Your Cyber Threats? Test Your Knowledge With Our Quiz

QuizThere are an unfortunate number of cyber threats out there; protecting your company’s network from these threats is paramount. In order to find out how acquainted you are with the malicious programs and attacks that could harm your business, we’ve devised this quick quiz to test your knowledge.

  1. A virus installs a program that records your keyboard activity without your knowledge. This information is then used to determine login credentials for your sensitive accounts. What kind of threat does this describe?
    1. Trojan
    2. Botnet
    3. Keylogger
    4. Spyware


  2. Infected devices are remotelycommandeered and their resources are used to attack and further infect other devices. These attacks are usually carried out by overwhelming the target under a flood of traffic. An infected device is often referred to as a “zombie.” What was this attack caused by?
    1. Adware
    2. Pharming
    3. Packet Spoofing
    4. Botnet


  3. An issue in a piece of legacy software's code has gone unresolved, and since that software is no longer supported, there will not be an update to resolve the issue. What kind of threat does this describe?
    1. Phishing
    2. Zero-Day Exploit
    3. Ransomware
    4. Malicious Insider


  4. An executable file is concealed in a legitimate piece of software, or what appears to be one, in order to be installed without the target’s knowledge. From there, it can wreak havoc on your systems, deleting files or stealing your information. What kind of threat does this describe?
    1. Spoofing
    2. Trojan
    3. Spam
    4. Social Engineering


  5. A piece of software is installed on a network and takes a record of intercepted traffic. The software then extracts data from this intercepted network traffic. What is the threat?
    1. Network Sniffer
    2. Spear Phishing
    3. Distributed Denial of Service
    4. Ransomware


  6. One of your employees is upset by one of your policies, and as a form of revenge will either steal data for personal financial gain or cause issues within your network, thereby disrupting productivity. What does this describe?
    1. Keylogger
    2. Malicious Insider
    3. Botnet
    4. Network Sniffer


  7. An employee receives an email from someone who claims to be from Microsoft, stating that they need to access your system in order to resolve an issue that they have detected. All an employee needs to do is click on a link included in the email. Which threat does this describe?
    1. Spear Phishing
    2. Adware
    3. Packet Spoofing
    4. Spam


  8. A hacker manages to lock down your files, demanding that you pay them in order to regain access to your critical information. Often, the hacker threatens to delete your information if they are not paid within a certain timeframe. Which threat does this describe?
    1. Social Engineering
    2. Spyware
    3. Ransomware
    4. Keylogger


  9. A collection of software tools allows someone to access your network without your knowledge. This software then allows other threats to propagate on your system, invisible to your security measures. Which type of threat is this?
    1. Packet Spoofing
    2. Botnet
    3. Network Sniffer
    4. Rootkit


  10. A program displays advertising information for unwanted and often inappropriate materials while the user is online. It also collects the user’s data without their permission. Which threat does this describe?
    1. Adware
    2. Spyware
    3. Spam
    4. Trojan

The answers can be found below. How did you do? Did you recognize the other threats you had to pick from? They are all very real, and present a very real risk to your security. Make sure you acquaint yourself with them so that you and your staff can be aware of their access points.


1. C

2. D

3. B

4. B

5. A

6. B

7. A

8. C

9. D

10. A



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Thursday, 24 May 2018
If you'd like to register, please fill in the username, password and name fields.