
Cybersecurity Fundamentals Week 3 Quiz
Authored by Marcus Phang
Computers
KG - University
Used 60+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What occurs on a computer when data goes beyond the limits of a buffer?
a system exception
cross-site scripting
an SQL injection
a buffer overflow
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a rootkit modify?
programs
Microsoft Word
operating system
Use antivirus software
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?
a type of virus
a type of worm
a type of logic bomb
a type of ransomware
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What is the name given to a program or program code that bypasses normal authentication?
(a)
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?
(a)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the meaning of the term logic bomb?
a malicious virus
a malicious worm
a malicious program that hides itself in a legitimate program
a malicious program that uses a trigger to awaken the malicious code
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the name for the type of software that generates revenue by generating annoying pop-ups?
adware
pop-ups
spyware
trackers
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?