What are Trojan Horses?
Hackers & Cyber Attacks: Crash Course Computer Science #32

Quiz
•
Computers
•
11th Grade
•
Hard
Paloma Calvo
Used 5+ times
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Programs that masquerade as harmeless attachments, but actually contain malicious software, called malware.
A pretexting technique to steal important data from a company.
The subterfuge that the Greeks used to enter the independent city of Troy and win the war.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Ramsomware?
Is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
Is a type of malicious code or software that looks legitimate but can take control of your computer.
Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Buffer overflow?
Is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
Is a type of malicious code or software that looks legitimate but can take control of your computer.
Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Methods to combat Buffer Overflow Attacks:
Bounds checking: always test the length of input before copying into a buffer.
Canaries: unused space after buffers.
Sharks: pieces of code stored in buffers that overwrite malicious coding.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is use in the video to show and example of "Code injection"?
SQL Query
A Secret portal of governamental data
A buffer of open memory
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As a level of defense, some servers sanitize input, which means...
Removing or modifying special characters before running database queries.
Having code audited by a crowd of security-minded developers
Cleaning thoroughly the keyboard to avoid virus infections.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a worm in cybersecurity?
A program that jumps from computer to computer automatically.
Is a type of malware that is often disguised as legitimate software
Is a form of malware that encrypts a victim's files.
Animals that typically have a long cylindrical tube-like body, no limbs, and no eyes.
Similar Resources on Quizizz
10 questions
Week2 Quiz - Maleware types

Quiz
•
11th Grade
11 questions
IT Security Threats

Quiz
•
10th - 12th Grade
10 questions
BTEC DIT C3 LAB - Internal Threats

Quiz
•
10th - 11th Grade
9 questions
Malware vocabulary

Quiz
•
9th - 12th Grade
8 questions
Hacker quiz

Quiz
•
9th - 12th Grade
8 questions
CSP 10-7 Security Risks

Quiz
•
9th - 11th Grade
11 questions
18. Cyber security Threats Quiz

Quiz
•
9th - 12th Grade
9 questions
Basic cyber security knowledge

Quiz
•
KG - University
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University