Quiz: Can you name these common cyberattacks?

Take our quiz and see how informed you are about cybersecurity

Quiz: Test yourself and name these common cyberattacks

Hackers are constantly trying new tactics to gain access to corporate data. Test yourself and see if you can name these seven common types of attacks. Then check your answers against the key at the bottom.

  1. A program that generates passwords based on commonly used combinations of words, numbers, and characters. It relies on raw computing power to test those combinations.

    A. Phishing
    B. Brute force attack
    C. Man in the middle
    D. Traffic interception

  2. A program that impersonates a website or an application, capturing the information the user enters: usernames, passwords, and possibly also other sensitive information.

    A. Spear phishing
    B. Distributed denial-of-service
    C. Man in the middle
    D. Social engineering

  3. Messages, usually in the form of emails or texts, which attempt to trick users into providing their usernames and/or passwords. Or to click a link that will install malicious programs.

    A. Phishing
    B. Quid pro quo
    C. SQL injection
    D. Dictionary attack

  4. A program that uses a list of common words and tries them, in various combinations and with various capitalization and number combinations, to generate passwords to use with usernames against accounts.

    A. Dictionary attack
    B. Quid pro quo
    C. Social engineering
    D. Traffic interception

  5. Software that monitors a network seeking passwords being sent (encrypted or not) or other sensitive information.

    A. Baiting
    B. SQL injection
    C. Traffic interception
    D.Distributed denial-of-service

  6. Well-crafted, tailored messages with some personal information. They are designed to trick people into giving up sensitive information such as passwords or account numbers. This attack relies on the fact that people often assume that only a valid entity would have personal information.

    A. Phishing
    B. Zero day exploit
    C. Man in the middle
    D. Spear phishing

  7. A program installed on a user’s device (usually by tricking the user into clicking a link) which tracks the user’s every keystroke on that device.

    A. Quid pro quo
    B. Key logger
    C. Traffic intercept
    D. Baiting


  1. B) Brute force attack
  2. C) Man in the middle
  3. A) Phishing
  4. A) Dictionary attack
  5. C) Traffic interception
  6. D) Spear phishing
  7. B) Key logger

Thank you! We have received your details. Our sales teams will reach out to you shortly.

We’re passing along your contact information to our experts.

Something went wrong, please try again.

See Demo of OneLogin

Register to Watch Recorded Demo Videos

All Fields RequiredFields Required*

  • Please enter your first name
  • Please enter your last name
  • Please enter company name
  • Include all internal and external users

    Please enter number of employees
  • Note: Please enter a work email address only as we DO NOT accept web-mail addresses (gmail, yahoo, hotmail, etc.)

    Is that a correct business email address?
  • Please enter your phone number
  • I agree to OneLogin’s Privacy Policy

Related Resources:

What type of attacks does Multi-Factor Authentication prevent?

Learn how Multi-Factor Authentication can help prevent common cyberattacks and security breaches.

Read More

What is cyber security and why is it needed?

Understand what cybersecurity means, the types of cyber attacks, and how you can prevent them.

Read More

What is Adaptive Authentication?

Learn what Adaptive Authentication is and how it can intelligently use machine learning to protect your company resources from cyberattacks.

Read More