Quiz: Can you name these common cyberattacks?

Take our quiz and see how informed you are about cybersecurity

Quiz: Test yourself and name these common cyberattacks

Hackers are constantly trying new tactics to gain access to corporate data. Test yourself and see if you can name these seven common types of attacks. Then check your answers against the key at the bottom.

  1. A program that generates passwords based on commonly used combinations of words, numbers, and characters. It relies on raw computing power to test those combinations.

    A. Phishing
    B. Brute force attack
    C. Man in the middle
    D. Traffic interception

  2. A program that impersonates a website or an application, capturing the information the user enters: usernames, passwords, and possibly also other sensitive information.

    A. Spear phishing
    B. Distributed denial-of-service
    C. Man in the middle
    D. Social engineering

  3. Messages, usually in the form of emails or texts, which attempt to trick users into providing their usernames and/or passwords. Or to click a link that will install malicious programs.

    A. Phishing
    B. Quid pro quo
    C. SQL injection
    D. Dictionary attack

  4. A program that uses a list of common words and tries them, in various combinations and with various capitalization and number combinations, to generate passwords to use with usernames against accounts.

    A. Dictionary attack
    B. Quid pro quo
    C. Social engineering
    D. Traffic interception

  5. Software that monitors a network seeking passwords being sent (encrypted or not) or other sensitive information.

    A. Baiting
    B. SQL injection
    C. Traffic interception
    D.Distributed denial-of-service

  6. Well-crafted, tailored messages with some personal information. They are designed to trick people into giving up sensitive information such as passwords or account numbers. This attack relies on the fact that people often assume that only a valid entity would have personal information.

    A. Phishing
    B. Zero day exploit
    C. Man in the middle
    D. Spear phishing

  7. A program installed on a user’s device (usually by tricking the user into clicking a link) which tracks the user’s every keystroke on that device.

    A. Quid pro quo
    B. Key logger
    C. Traffic intercept
    D. Baiting

Answers:

  1. B) Brute force attack
  2. C) Man in the middle
  3. A) Phishing
  4. A) Dictionary attack
  5. C) Traffic interception
  6. D) Spear phishing
  7. B) Key logger

Thanks for signing up.

We’ve sent a verification email to

To complete your trial sign up, please check your email and follow instructions to verify. You may need to check your spam. You will be prompted to set up a password and log in. Please note that your user name is your email address.

Get Started in 3 Easy Steps:

Try OneLogin Free for 30 days

All fields are required

  • This field is required.
  • Please enter your first name
  • Please enter your last name
  • Please enter your job title
  • Please enter your phone number
  • Note: Please enter a work email address only as we DO NOT accept web-mail addresses (gmail, yahoo, hotmail, etc.)

    Is that a correct business email address?
  • Please enter company name
  • .onelogin.com
    Please choose another subdomain
  • Please enter number of employees
  • Please enter country
  • Please enter state
  • By completing and submitting this form, I agree to the storing and processing of my personal data by OneLogin as described in our Terms of Service and Privacy Policy.

  • By creating your account, you agree to the Terms of Service and Privacy Policy.

Related Resources:

What type of attacks does Multi-Factor Authentication prevent?

Learn how Multi-Factor Authentication can help prevent common cyberattacks and security breaches.

Read More

What is cyber security and why is it needed?

Understand what cybersecurity means, the types of cyber attacks, and how you can prevent them.

Read More

What is Adaptive Authentication?

Learn what Adaptive Authentication is and how it can intelligently use machine learning to protect your company resources from cyberattacks.

Read More