Search Header Logo

Review - Unit 1.2 & 1.3 (Cybersecurity)

Authored by Lisa Zaranski

others

Used 2+ times

Review - Unit 1.2 & 1.3  (Cybersecurity)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A program that attaches itself to a host file and replicates itself on A system.

Virus
Worm
Trojan
Backdoor

2.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A program that reproduces itself and can transport from system TO system WITHOUT attaching to a file.

Virus
Worm
Trojan
Backdoor

3.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A files that appear to be legitimate programs, but really contain malicious code.

Virus
Worm
Trojan
Backdoor

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

An attack that takes advantage of code flaws that have VERY recently been discovered.

Zero Day
Backdoor
Rootkit
Botnets

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A group of programs installed by an attacker to gain complete control of a computer.

Zero Day
Logic Bomb
Rootkit
Botnets

6.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A program that blocks access to files or use of the device until a ransom is paid.

Ransomware
Logic Bomb
Spyware
Adware

7.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Software that gathers data and forwards it to a third party without the consent or knowledge of the user.

Spyware
Logic Bomb
Ransomware
Addware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?