
Security Systems - Threats
Authored by Daniel Watson
Computers
10th Grade
Used 577+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An example of social engineering...
Viruses
Worms
Telephone IVR Phishing
Trojan Horses
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware…
Are different types of threats to computer systems
Is a manufacturer of computer parts
Are hard to find on the internet
Distribution is completely legal
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Viruses...
Do not need to attach to a program
Need to attach to a program
A type of social engineering
Designed to access a computer by misleading users of its intent by prompting to download a program
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Worms...
Do not need to attach to a program
Need to attach to a program
A type of social engineering
Designed to access a computer by misleading users of its’ intent by prompting to download a program
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Trojan Horses
Does not need to attach to a program
Can only occur when a computer is not connected to a network
A type of social engineering
Designed to access a computer by misleading users of its’ intent by prompting to download a program
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How many viruses are made each day?
10
30
54,000
82,000
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What can viruses affect?
Keyboard
Hard Drive
RAM
All the above
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?