Hackers & Cyber Attacks: Crash Course Computer Science #32

Hackers & Cyber Attacks: Crash Course Computer Science #32

11th Grade

7 Qs

quiz-placeholder

Similar activities

Malware vocabulary

Malware vocabulary

9th - 12th Grade

9 Qs

Kelompok 5 XI TKJ 2

Kelompok 5 XI TKJ 2

11th Grade

10 Qs

BTEC DIT C3 LAB - Internal Threats

BTEC DIT C3 LAB - Internal Threats

10th - 11th Grade

10 Qs

What's the Word?

What's the Word?

11th Grade

10 Qs

18. Cyber security Threats Quiz

18. Cyber security Threats Quiz

9th - 12th Grade

11 Qs

Basic cyber security knowledge

Basic cyber security knowledge

KG - University

9 Qs

Cybersecurity Fundamentals Week 6 Quiz

Cybersecurity Fundamentals Week 6 Quiz

KG - University

10 Qs

Malware and Attack Technologies

Malware and Attack Technologies

9th - 12th Grade

12 Qs

Hackers & Cyber Attacks: Crash Course Computer Science #32

Hackers & Cyber Attacks: Crash Course Computer Science #32

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Paloma Calvo

Used 5+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Trojan Horses?

Programs that masquerade as harmeless attachments, but actually contain malicious software, called malware.

A pretexting technique to steal important data from a company.

The subterfuge that the Greeks used to enter the independent city of Troy and win the war.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Ramsomware?

Is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

Is a type of malicious code or software that looks legitimate but can take control of your computer.

Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Buffer overflow?

Is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

Is a type of malicious code or software that looks legitimate but can take control of your computer.

Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Methods to combat Buffer Overflow Attacks:

Bounds checking: always test the length of input before copying into a buffer.

Canaries: unused space after buffers.

Sharks: pieces of code stored in buffers that overwrite malicious coding.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is use in the video to show and example of "Code injection"?

SQL Query

A Secret portal of governamental data

A buffer of open memory

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As a level of defense, some servers sanitize input, which means...

Removing or modifying special characters before running database queries.

Having code audited by a crowd of security-minded developers

Cleaning thoroughly the keyboard to avoid virus infections.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a worm in cybersecurity?

A program that jumps from computer to computer automatically.

Is a type of malware that is often disguised as legitimate software

Is a form of malware that encrypts a victim's files.

Animals that typically have a long cylindrical tube-like body, no limbs, and no eyes.