Search Header Logo

Threats to Data

Authored by Peter Astbury

Computers

9th - 12th Grade

Used 51+ times

Threats to Data
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

11 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

....................... software is usually shortened as simply 'malware'.

2.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which of these are types of malware?

phishing

trojan horses

war driving

spyware

social engineering

3.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

A ................ is a type of malware which replicates itself in order to spread to other devices.

4.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

A ............is a kind of virus which spreads across computer networks.

5.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

A .............. horse is type of malware which disguises itself as legitimate, useful software.

6.

MULTIPLE SELECT QUESTION

20 sec • 1 pt

Which type of malware lies dormant until triggered by a set condition?

virus

spyware

logic bomb

worm

7.

FILL IN THE BLANK QUESTION

20 sec • 1 pt

A hacker may build a ...... net which allows them to control the resources of many separate computers.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?