Quiz: Can you name these common cyberattacks?

Take our quiz and see how informed you are about cybersecurity

Quiz: Test yourself and name these common cyberattacks

Hackers are constantly trying new tactics to gain access to corporate data. Test yourself and see if you can name these seven common types of attacks. Then check your answers against the key at the bottom.

  1. A program that generates passwords based on commonly used combinations of words, numbers, and characters. It relies on raw computing power to test those combinations.

    A. Phishing
    B. Brute force attack
    C. Man in the middle
    D. Traffic interception

  2. A program that impersonates a website or an application, capturing the information the user enters: usernames, passwords, and possibly also other sensitive information.

    A. Spear phishing
    B. Distributed denial-of-service
    C. Man in the middle
    D. Social engineering

  3. Messages, usually in the form of emails or texts, which attempt to trick users into providing their usernames and/or passwords. Or to click a link that will install malicious programs.

    A. Phishing
    B. Quid pro quo
    C. SQL injection
    D. Dictionary attack

  4. A program that uses a list of common words and tries them, in various combinations and with various capitalization and number combinations, to generate passwords to use with usernames against accounts.

    A. Dictionary attack
    B. Quid pro quo
    C. Social engineering
    D. Traffic interception

  5. Software that monitors a network seeking passwords being sent (encrypted or not) or other sensitive information.

    A. Baiting
    B. SQL injection
    C. Traffic interception
    D.Distributed denial-of-service

  6. Well-crafted, tailored messages with some personal information. They are designed to trick people into giving up sensitive information such as passwords or account numbers. This attack relies on the fact that people often assume that only a valid entity would have personal information.

    A. Phishing
    B. Zero day exploit
    C. Man in the middle
    D. Spear phishing

  7. A program installed on a user’s device (usually by tricking the user into clicking a link) which tracks the user’s every keystroke on that device.

    A. Quid pro quo
    B. Key logger
    C. Traffic intercept
    D. Baiting


  1. B) Brute force attack
  2. C) Man in the middle
  3. A) Phishing
  4. A) Dictionary attack
  5. C) Traffic interception
  6. D) Spear phishing
  7. B) Key logger

Related Resources:

What type of attacks does Multi-Factor Authentication prevent?

Learn how Multi-Factor Authentication can help prevent common cyberattacks and security breaches.

Read More

What is cyber security and why is it needed?

Understand what cybersecurity means, the types of cyber attacks, and how you can prevent them.

Read More

What is Adaptive Authentication?

Learn what Adaptive Authentication is and how it can intelligently use machine learning to protect your company resources from cyberattacks.

Read More