Search Header Logo

Cyber Sem 1 Final Review

Authored by Jessica Mehringer

Computers

9th - 12th Grade

Used 5+ times

Cyber Sem 1 Final Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a backdoor?

Malware that is spread by user action, such as clicking a link or sharing an infected file

Malware that uses services running on a computer such as network connections or email to spread itself.

Malware that allows an attacker to bypass the normal authentication required to access a system

Malware that is disguised as legitimate software.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes spyware?

malware that is spread by user action, such as clicking link or sharing an infected file

Malware that allows an attacker to bypass the normal authentication required to access a system.

Malware that secretly collects information about a computer system or the actions of the user of a computer.

Malware that is disguised as legitimate software

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a worm?

Malware that is spread by user action, such as clicking a link or sharing an infected file.

Malware that uses services running on a computer such as network connections or email to spread itself

Malware that allows an attacker to bypass the normal authentication required to access a system.

Malware the is disguised as legitimate software

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes a virus?

Malware that is spread by user action, such as clicking a link or sharing an infected file

Malware that allows an attacker to bypass the normal authentication required to access a system.

Malware that secretly collects information about a computer system or the actions of the user of a computer

Malware that is disguised as legitimate software

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service commonly uses port 25?

SMTP

FTP

HTTPS

DNS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer system contains the file somefile.vba.txt. What is the extension of the file?

,vba

,txt

.vba.txt

somefile.vba

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When exploring the files stored on a computer system, which of the following actions is least important to help identify potentially malicious files?

Sort files by date of file creation

show the full file extension

show the owner of the file

show hidden files

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?