Search Header Logo

[AP CSP] Malware & Phishing Scams

Authored by Tommy Nguyen

Computers

9th - 12th Grade

CCSS covered

Used 69+ times

[AP CSP] Malware & Phishing Scams
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

21 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which malware(s) type requires a hosted program?

worm

virus

backdoor

trojan horse

logic bomb

2.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Which malware(s) is considered an independent program?

worm

botnet

backdoor

trojan horse

logic bomb

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which malware type requires a condition to be met, before it executes it's malicious code?

worm

botnet

backdoor

trojan horse

logic bomb

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which malware type looks like a ligitimate software, but actually contains malicious code in it?

worm

virus

backdoor

trojan horse

logic bomb

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which malware type is capable of performing Distributed Denial of Service (DDos) attacks?

worm

botnet

backdoor

trojan horse

logic bomb

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which malware type is capable of spread to other software in the system?

worm

botnet

virus

trojan horse

logic bomb

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A fraudulent website requires you to input your username, password, or credit card information, with the intent to steal that information. This is known as...

DDoS

phishing

ransomware

trojan horse

worm

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?