3.3 Cybersecurity Flashcard

3.3 Cybersecurity Flashcard

Assessment

Flashcard

Computers

9th - 12th Grade

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

Student preview

quiz-placeholder

10 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What is a Trojan horse in the context of cybersecurity?

Back

Malicious software disguised as harmless or legitimate software.

2.

FLASHCARD QUESTION

Front

What is the significance of the term "Trojan Horse" in cybersecurity?

Back

It symbolizes deceptive tactics used by hackers to gain unauthorized access.

3.

FLASHCARD QUESTION

Front

How do Trojan horses typically enter a victim's computer?

Back

Via email attachments or free downloads.

4.

FLASHCARD QUESTION

Front

What distinguishes a Trojan horse from a computer virus?

Back

A Trojan horse requires user assistance to propagate.

5.

FLASHCARD QUESTION

Front

What is a backdoor in the context of cybersecurity?

Back

A means to access a system or data bypassing normal security controls.

6.

FLASHCARD QUESTION

Front

What is a Remote Access Trojan (RAT)?

Back

A Trojan horse with a backdoor allowing for remote control of the infected host.

7.

FLASHCARD QUESTION

Front

What can a hacker do once a Remote Access Trojan (RAT) is installed on a victim's computer?

Back

Control the computer remotely and perform various actions such as viewing files and taking screenshots.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?