Try to match each type of malware with the correct scenario
Cybersecurity 2.2.1 - 2.2.3

Quiz
•
Computers
•
10th - 12th Grade
•
Medium
Beverly Ross
Used 26+ times
FREE Resource
19 questions
Show all answers
1.
MATCH QUESTION
1 min • 10 pts
Programming Error
While checking a monitor cable, a user notices a strange-looking USB device plugged into the back of their compture
Man-in-the-middle
A software program was not reviewd by a peer nor checked by a quality assurance team before it's release to the public
Botnet/DDos
Access to system devices, such as printers and network switches, fails frequently. To solve the problem, the comuters operating system must be rebuilt.
Rootkit
A user's computer boots, but when they try to access their data, it appears garbled and is unreadable.
Ransomware
A vistor to a website notices a delay in exchanging data with the site and the lock symbol in the address bar looks strange
2.
DRAW QUESTION
3 mins • 10 pts
Diagram what happens in an On-Path Attack

3.
MULTIPLE CHOICE QUESTION
30 sec • 3 pts
An ethical cyber expert can expect the following aspects to their career except for
Many rewarding career opportunities
May never get hired anywhere
Lifetime earning
Can provide reliable, stable lifestyle
4.
MATCH QUESTION
1 min • 10 pts
Match the following name of the motivation of a hacker with the correct description
Social Ideology
Companies steal information from competitors to elimate the competition.
Prevention
Hackers engage in "hactivism" to change aspects of society
Whistleblower
Criminals steal money from individuals & corporations
Financial Gain
An "insider" exposes injustice that the organization is committing.
Industrial Espionage
With permission from the system owner, authorized hackers find the weaknesses of a system and report their findings.
5.
OPEN ENDED QUESTION
3 mins • 5 pts
What is the difference between Hardware Keyloggers and Software keyloggers
Evaluate responses using AI:
OFF
6.
MULTIPLE CHOICE QUESTION
30 sec • 2 pts
What is latency?
a delay in the transfer of data
an encryption code
a type of crypto-currency
a type of malware
7.
REORDER QUESTION
1 min • 10 pts
Reorder the following steps for using FileZilla
Select files to copy under Local Site
Enter IP address of remote machine in Host Field
Enter username & Password
On remote site, find file(s) to copy
Right-click file & choose "Upload"
Create a free account and access millions of resources
Similar Resources on Quizizz
21 questions
Impacts of Digital Technology (Cars, cloud, shopping)

Quiz
•
10th - 11th Grade
17 questions
File Management, NTFS Permissions, & Using the Command Line

Quiz
•
9th - 12th Grade
21 questions
4. razred TŠRB - DIOIS - Dijagnostika Win2019 kao FTP servera

Quiz
•
12th Grade
15 questions
Basic Microsoft Word

Quiz
•
1st Grade - Professio...
15 questions
Malware

Quiz
•
9th - 11th Grade
22 questions
Malware

Quiz
•
7th - 10th Grade
16 questions
Network Threats

Quiz
•
9th - 12th Grade
19 questions
Technology

Quiz
•
10th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University