Hackers & Cyber Attacks: Crash Course Computer Science #32

Quiz
•
Computers
•
11th Grade
•
Hard
Paloma Calvo
Used 5+ times
FREE Resource
7 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are Trojan Horses?
Programs that masquerade as harmeless attachments, but actually contain malicious software, called malware.
A pretexting technique to steal important data from a company.
The subterfuge that the Greeks used to enter the independent city of Troy and win the war.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Ramsomware?
Is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
Is a type of malicious code or software that looks legitimate but can take control of your computer.
Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Buffer overflow?
Is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.
Is a type of malicious code or software that looks legitimate but can take control of your computer.
Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Methods to combat Buffer Overflow Attacks:
Bounds checking: always test the length of input before copying into a buffer.
Canaries: unused space after buffers.
Sharks: pieces of code stored in buffers that overwrite malicious coding.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is use in the video to show and example of "Code injection"?
SQL Query
A Secret portal of governamental data
A buffer of open memory
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
As a level of defense, some servers sanitize input, which means...
Removing or modifying special characters before running database queries.
Having code audited by a crowd of security-minded developers
Cleaning thoroughly the keyboard to avoid virus infections.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a worm in cybersecurity?
A program that jumps from computer to computer automatically.
Is a type of malware that is often disguised as legitimate software
Is a form of malware that encrypts a victim's files.
Animals that typically have a long cylindrical tube-like body, no limbs, and no eyes.
Similar Resources on Wayground
10 questions
Cybersecurity Attack Types Quiz

Quiz
•
5th Grade - University
8 questions
Security Risks

Quiz
•
9th - 12th Grade
10 questions
SHS_Empowerment Technologies_MELC#2_QUIZ2

Quiz
•
11th - 12th Grade
10 questions
Ethics and Safety measures in Computing

Quiz
•
6th - 12th Grade
10 questions
Basic Networking (Y8)

Quiz
•
7th Grade - University
10 questions
BTEC DIT C3 LAB - Why Systems Are Attacked

Quiz
•
10th - 11th Grade
10 questions
ICT - CSS - ICCS - Install Application Software

Quiz
•
9th - 12th Grade
10 questions
BTEC DIT C3 LAB - Data Level Protection 1

Quiz
•
10th - 11th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade