
Cyber Sem 1 Final Review
Authored by Jessica Mehringer
Computers
9th - 12th Grade
Used 5+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a backdoor?
Malware that is spread by user action, such as clicking a link or sharing an infected file
Malware that uses services running on a computer such as network connections or email to spread itself.
Malware that allows an attacker to bypass the normal authentication required to access a system
Malware that is disguised as legitimate software.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes spyware?
malware that is spread by user action, such as clicking link or sharing an infected file
Malware that allows an attacker to bypass the normal authentication required to access a system.
Malware that secretly collects information about a computer system or the actions of the user of a computer.
Malware that is disguised as legitimate software
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a worm?
Malware that is spread by user action, such as clicking a link or sharing an infected file.
Malware that uses services running on a computer such as network connections or email to spread itself
Malware that allows an attacker to bypass the normal authentication required to access a system.
Malware the is disguised as legitimate software
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a virus?
Malware that is spread by user action, such as clicking a link or sharing an infected file
Malware that allows an attacker to bypass the normal authentication required to access a system.
Malware that secretly collects information about a computer system or the actions of the user of a computer
Malware that is disguised as legitimate software
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What service commonly uses port 25?
SMTP
FTP
HTTPS
DNS
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A computer system contains the file somefile.vba.txt. What is the extension of the file?
,vba
,txt
.vba.txt
somefile.vba
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
When exploring the files stored on a computer system, which of the following actions is least important to help identify potentially malicious files?
Sort files by date of file creation
show the full file extension
show the owner of the file
show hidden files
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?