
Found. of IT: Security Threats - A
Computers
9th - 12th Grade
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A collection of internet-connected programs communicating with other similar programs in order to perform tasks.
Worm
Spyware
Phishing
Botnet Attack
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The act of masquerading as a trustworthy website or email to acquire user information; identity theft is the intent
Worm
Spyware
Phishing
Botnet Attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It is a type of malware that collects user information by tracking the habits of users.
Spyware
Adware
Virus
Trojan Horse
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Computer program hidden within the shell of another program with an alternative intent such as a virus.
Spyware
Adware
Virus
Trojan Horse
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software that uses computer networks and security holes to replicate itself.
Worm
Spyware
Phishing
Botnet Attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A piece of software that attaches itself to computer programs; viruses replicate and typically have a payload
Spyware
Adware
Virus
Trojan Horse
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Advertising software that automatically generates advertisements. It can be legitimately developed software but in some cases it can pose a threat.
Spyware
Adware
Virus
Trojan Horse
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?