Search Header Logo

SOCIAL ISSUES REVIEW QUIZ TYPE OF EXPLOITS

Authored by joseph cortez

Instructional Technology

University

Used 7+ times

SOCIAL ISSUES REVIEW QUIZ TYPE OF EXPLOITS
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a self-replicating malware program that can spread across networks and systems without user intervention, often causing harm by consuming resources or carrying out malicious actions.

Trojan Horse

Worm

DDos

Rootkit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is the use of deliberate and large-scale cyberattacks, often by politically motivated individuals or groups, to create fear, disrupt critical infrastructure, or cause harm to a nation or its population through digital means.

Smishing

Email Spam

Vishing

Cyberterrorism

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information, banking and credit card details, and passwords.

Vishing

Phishing

Rootkit

Email Spam

4.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

is a type of malware that disguises itself as a legitimate program or file to deceive users and gain unauthorized access to their systems, often with malicious intent.

(a)  

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

malware strain that typically infects a victim's computer through deceptive email attachments or malicious downloads, and it is designed to steal sensitive information, such as login credentials and financial data, by recording keystrokes and capturing screen images.

Zues

Zeus

sbot

Poseidon

6.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

It is a social engineering attack that uses fake mobile text messages to trick people into downloading malware, sharing sensitive information, or sending money to cybercriminals.

(a)  

7.

FILL IN THE BLANKS QUESTION

1 min • 1 pt

It is a networking device that connects multiple networks together and forwards data packets from one network to another

(a)  

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?