Search Header Logo

Found. of IT: Security Threats - A

Computers

9th - 12th Grade

Used 7+ times

Found. of IT: Security Threats - A
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A collection of internet-connected programs communicating with other similar programs in order to perform tasks.

Worm

Spyware

Phishing

Botnet Attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The act of masquerading as a trustworthy website or email to acquire user information; identity theft is the intent

Worm

Spyware

Phishing

Botnet Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a type of malware that collects user information by tracking the habits of users.

Spyware

Adware

Virus

Trojan Horse

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Computer program hidden within the shell of another program with an alternative intent such as a virus.

Spyware

Adware

Virus

Trojan Horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that uses computer networks and security holes to replicate itself.

Worm

Spyware

Phishing

Botnet Attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A piece of software that attaches itself to computer programs; viruses replicate and typically have a payload

Spyware

Adware

Virus

Trojan Horse

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Advertising software that automatically generates advertisements. It can be legitimately developed software but in some cases it can pose a threat.

Spyware

Adware

Virus

Trojan Horse

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?