Search Header Logo

Hackers & Cyber Attacks: Crash Course Computer Science #32

Authored by Paloma Calvo

Computers

11th Grade

Used 5+ times

Hackers & Cyber Attacks: Crash Course Computer Science #32
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Trojan Horses?

Programs that masquerade as harmeless attachments, but actually contain malicious software, called malware.

A pretexting technique to steal important data from a company.

The subterfuge that the Greeks used to enter the independent city of Troy and win the war.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Ramsomware?

Is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

Is a type of malicious code or software that looks legitimate but can take control of your computer.

Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Buffer overflow?

Is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

Is a type of malicious code or software that looks legitimate but can take control of your computer.

Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Methods to combat Buffer Overflow Attacks:

Bounds checking: always test the length of input before copying into a buffer.

Canaries: unused space after buffers.

Sharks: pieces of code stored in buffers that overwrite malicious coding.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is use in the video to show and example of "Code injection"?

SQL Query

A Secret portal of governamental data

A buffer of open memory

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As a level of defense, some servers sanitize input, which means...

Removing or modifying special characters before running database queries.

Having code audited by a crowd of security-minded developers

Cleaning thoroughly the keyboard to avoid virus infections.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a worm in cybersecurity?

A program that jumps from computer to computer automatically.

Is a type of malware that is often disguised as legitimate software

Is a form of malware that encrypts a victim's files.

Animals that typically have a long cylindrical tube-like body, no limbs, and no eyes.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?