Hackers & Cyber Attacks: Crash Course Computer Science #32

Hackers & Cyber Attacks: Crash Course Computer Science #32

11th Grade

7 Qs

quiz-placeholder

Similar activities

IT Security Threats

IT Security Threats

10th - 12th Grade

11 Qs

Malware

Malware

9th - 12th Grade

10 Qs

ICT - CSS - ICCS - Install Application Software

ICT - CSS - ICCS - Install Application Software

9th - 12th Grade

10 Qs

BTEC DIT C3 LAB - Data Level Protection 1

BTEC DIT C3 LAB - Data Level Protection 1

10th - 11th Grade

10 Qs

Digital Security

Digital Security

9th - 12th Grade

10 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Security Risks

Security Risks

9th - 12th Grade

8 Qs

BTEC DIT C3 LAB - Why Systems Are Attacked

BTEC DIT C3 LAB - Why Systems Are Attacked

10th - 11th Grade

10 Qs

Hackers & Cyber Attacks: Crash Course Computer Science #32

Hackers & Cyber Attacks: Crash Course Computer Science #32

Assessment

Quiz

Computers

11th Grade

Hard

Created by

Paloma Calvo

Used 5+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are Trojan Horses?

Programs that masquerade as harmeless attachments, but actually contain malicious software, called malware.

A pretexting technique to steal important data from a company.

The subterfuge that the Greeks used to enter the independent city of Troy and win the war.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Ramsomware?

Is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

Is a type of malicious code or software that looks legitimate but can take control of your computer.

Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Buffer overflow?

Is a type of malware from cryptovirology that threatens to publish the victim's data or perpetually block access to it unless a ransom is paid.

Is a type of malicious code or software that looks legitimate but can take control of your computer.

Is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory locations

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Methods to combat Buffer Overflow Attacks:

Bounds checking: always test the length of input before copying into a buffer.

Canaries: unused space after buffers.

Sharks: pieces of code stored in buffers that overwrite malicious coding.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is use in the video to show and example of "Code injection"?

SQL Query

A Secret portal of governamental data

A buffer of open memory

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

As a level of defense, some servers sanitize input, which means...

Removing or modifying special characters before running database queries.

Having code audited by a crowd of security-minded developers

Cleaning thoroughly the keyboard to avoid virus infections.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a worm in cybersecurity?

A program that jumps from computer to computer automatically.

Is a type of malware that is often disguised as legitimate software

Is a form of malware that encrypts a victim's files.

Animals that typically have a long cylindrical tube-like body, no limbs, and no eyes.