

3.3 Cybersecurity Flashcard
Flashcard
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

10 questions
Show all answers
1.
FLASHCARD QUESTION
Front
What is a Trojan horse in the context of cybersecurity?
Back
Malicious software disguised as harmless or legitimate software.
2.
FLASHCARD QUESTION
Front
What is the significance of the term "Trojan Horse" in cybersecurity?
Back
It symbolizes deceptive tactics used by hackers to gain unauthorized access.
3.
FLASHCARD QUESTION
Front
How do Trojan horses typically enter a victim's computer?
Back
Via email attachments or free downloads.
4.
FLASHCARD QUESTION
Front
What distinguishes a Trojan horse from a computer virus?
Back
A Trojan horse requires user assistance to propagate.
5.
FLASHCARD QUESTION
Front
What is a backdoor in the context of cybersecurity?
Back
A means to access a system or data bypassing normal security controls.
6.
FLASHCARD QUESTION
Front
What is a Remote Access Trojan (RAT)?
Back
A Trojan horse with a backdoor allowing for remote control of the infected host.
7.
FLASHCARD QUESTION
Front
What can a hacker do once a Remote Access Trojan (RAT) is installed on a victim's computer?
Back
Control the computer remotely and perform various actions such as viewing files and taking screenshots.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?