Intro to Cybersecurity Quiz 2

Intro to Cybersecurity Quiz 2

9th - 12th Grade

23 Qs

quiz-placeholder

Similar activities

Sistem Komputer

Sistem Komputer

10th Grade

20 Qs

Unit 2 Technology Systems Hardware

Unit 2 Technology Systems Hardware

11th - 12th Grade

20 Qs

Comando MSDos

Comando MSDos

12th Grade

21 Qs

Module 11 - Essential Peripherals 2

Module 11 - Essential Peripherals 2

9th - 12th Grade

20 Qs

Transporte Vs almacenamiento de información

Transporte Vs almacenamiento de información

9th - 12th Grade

20 Qs

ICT 3 - Storage

ICT 3 - Storage

7th - 10th Grade

20 Qs

OCR J276 1.3 Storage

OCR J276 1.3 Storage

9th - 11th Grade

20 Qs

1.5 Storage Devices

1.5 Storage Devices

9th - 12th Grade

20 Qs

Intro to Cybersecurity Quiz 2

Intro to Cybersecurity Quiz 2

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Nicole Krysa

Used 4+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call a program that attaches to a host file with a goal of installing itself on a system?

Virus

Worm

Logic Bomb

Backdoor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call a program that reproduces itself and can transport from system to system without attaching to a file?

Virus

Worm

Logic Bomb

Backdoor

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call a program that appears to be legitimate, but really contains malicious code?

Virus

Trojan

Logic Bomb

RootKit

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call a program that is timed to performs an operation on a system?

Virus

Trojan

Logic Bomb

RootKit

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call a group of programs installed by an attacker to gain complete control of a computer, and changes the operating system?

Virus

Trojan

Logic Bomb

RootKit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call an attack that takes advantage of code flaws that have been recently discovered?

Zero Day

Advanced Persistant Threat

Logic Bomb

RootKit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do you call an attack that establishes a presence on a system or a network for an extended period of time?

Zero Day

Advanced Persistant Threat

Logic Bomb

RootKit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?