
Cybersecurity Vocabulary 2022
Authored by Wendy Dyer
Computers
9th - 12th Grade
Used 203+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
These are efforts by bad actors to profit from their malicious attacks.
Cybercrime
Botnets
Adware
VPN
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A software exploit which in turns involves a combination of attacks against different vulnerabilities
blended threats
trojan horse
intranet
back doors
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
It acts as a barrier between a trusted system or network and outside connections, such as the Internet.
firewall
spyware
phishing
encryption
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A _________ is an automated program that runs over the Internet
spyware
virus
worm
bot
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A feature or defect of a computer system that allows surreptitious unauthorized access to data
intranet
trojan horse
back doors
blended threat
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Self replicating virus that does not alter files but resides in active memory and duplicates itself
worm
virus
spyware
trojan horse
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A planned event during which an organization simulates a cyber disruption to develop or test capabilities
internet
hacker
gateway
cyber exercise
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?