Chapter 2 Intro to Cyber

Chapter 2 Intro to Cyber

9th Grade

10 Qs

quiz-placeholder

Similar activities

OCR Malware CS

OCR Malware CS

KG - 10th Grade

7 Qs

network security

network security

9th Grade

15 Qs

Malware Quiz

Malware Quiz

9th - 12th Grade

10 Qs

Virus, Worms and Trojan Horses

Virus, Worms and Trojan Horses

7th - 9th Grade

15 Qs

Types of Malware

Types of Malware

6th - 9th Grade

14 Qs

network security

network security

9th Grade

15 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Unit 3 - 2.3.1 Application Vulnerabilitites

Unit 3 - 2.3.1 Application Vulnerabilitites

9th Grade - University

6 Qs

Chapter 2 Intro to Cyber

Chapter 2 Intro to Cyber

Assessment

Quiz

Computers

9th Grade

Medium

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a malicious application accesses memory allocated to other processes

Access Control Problems

Race Conditions

Buffer Overflow

Weakness in Security Practices

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data coming into a program with malicious content, designed to force the program to behave in an unintended way

Race conditions

non-validated input

weakness in security practices

Buffer Overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Incorrectly regulating who does what and what they can do with resources

Race Conditions

Access Control Problems

Buffer Overflow

Non-validated input

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When developers attempt to create their own security applications

Access Control Problems

Buffer Overflow

Race Conditions

Weakness in Security Practices

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When the output of an event depends on ordered or timed outputs

Race Conditions

Weakness in Security Practices

Buffer Overflow

Access Control Problems

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware designed to automatically perform action, usually online

Bot

Worm

MitMo

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious code that replicates itself by independently exploiting vulnerabilities in networks

worm

spyware

scareware

adware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?