
Network Security
Authored by Trent Russell
Computers
10th Grade
Used 165+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A program hiding inside a useful program with malicious purposes.
Trojan
Worm
Ransomeware
Phisphing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Able to attack the network using a smart device with low security like a thermostate, or home sercurity
Rootkits
Denial of Service
Zero Day Exploit
IOT Attack
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Everyone receives the same email in the office stating that they need to download the app to to prevent their computer for viruses. Thus allowing attacker gain access to your computer
Worms
Phisphing
Ransomware
Man in the Middle Attack
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Legitimate software, where they can gain remote control and administration-level access over a system
Ransomware
Rootkits
Zero Day Exploit
DOS Attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Taking an advantage of the small window when firmware being updated and before it's implimementd
Zero Day Exploit
Virus
Worm
Password Attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A program that is designed to overwhelm email servers and cause DOS
Worm
Trojan
Ransomeware
Spyware
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Attacker intercepts a two-party transaction, inserting themselves in the middle to steal and manipulate information
RootKits
Zero Day Exploit
DOS
Man In the Middle(MitM)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?