Discuss worms, trojans and viruses, and the vulnerabilities that

Quiz
•
Computers
•
12th Grade
•
Easy
Mark Gadsby
Used 2+ times
FREE Resource
12 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 1 pt
Zeus, which was first detected in 2007 and has become one of the most damaging pieces of botnet
software in the world. Zeus originally stole passwords via Internet Explorer’s Password Store and if it
detected that the user was visiting a banking website, it would use keylogging techniques to discover
usernames and passwords. Zeus has hit computers at the Bank of America, NASA, and Amazon.
Because the Zeus uses malware to obtain sensitive information, it can also be classed as Spyware.
How many computers had Zeus infected by 2009?
Evaluate responses using AI:
OFF
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This malware can self-replicate.
Worm
Trojan
Virus
3.
OPEN ENDED QUESTION
3 mins • 1 pt
Melissa (1999) was an early example of computer malware that succeeded in mass infection. Melissa
was distributed as an email attachment, which once downloaded and opened, disabled a number of
safeguards in Microsoft Word. Melissa then used a macro to send email messages, using the user's
email application to forward the attachment onto the first 50 contacts in their address book. Melissa
reportedly caused $80 million of damage and overloaded the email servers of more than 300
organisations.
How many workplace computers were infected by Melissa?
Evaluate responses using AI:
OFF
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
At first glance this malware appears to be a useful program.
Worm
Trojan
Virus
5.
OPEN ENDED QUESTION
3 mins • 1 pt
Mydoom was launched in 2004 and became the fastest-spreading computer malware of its time. It
was transmitted via email and infected hosts, causing them to carry out a distributed denial-of-
service (DDoS) attack against several tech companies. It is estimated that Mydoom infected between
12 and 25% of emails in 2004 and caused approximately $38 billion worth of damage.
What type of malware is Mydoom?
Evaluate responses using AI:
OFF
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This Malware can attach itself to an executable file.
Worm
Trojan
Virus
7.
OPEN ENDED QUESTION
3 mins • 1 pt
Heartbleed exploited a legitimate 'heartbeat' message sent by one computer to ensure that the
computer at the other end of a secure connection was still there. The 'heartbeat' is a short message
that is sent to the server, along with the number of characters in that message, and the server is
supposed to repeat the message back to confirm that it is still connected. However, in this case, the
code did not check the length of the message properly, and instead, relied on the number specified,
so attackers could request around 64,000 characters from the server's RAM, potentially including
sensitive information.
Which layer of the TCP/IP stack did the Heartbleed bug affect.
Evaluate responses using AI:
OFF
Create a free account and access millions of resources
Similar Resources on Wayground
8 questions
Malware Quiz

Quiz
•
12th Grade
10 questions
Technical Terms - Internet (A-Z) - Botnet

Quiz
•
12th Grade
16 questions
Online Safety: CyberSecurity

Quiz
•
6th - 12th Grade
10 questions
Unit 3 - 2.4.3 -Trojans, Backdoors, and RATs

Quiz
•
12th Grade
12 questions
Coding Quiz 1 - Term 2

Quiz
•
9th Grade - University
15 questions
Cyber Security KS4

Quiz
•
8th - 12th Grade
11 questions
Cyber Security Solutions

Quiz
•
9th - 12th Grade
17 questions
piggy (ROBLOX)

Quiz
•
5th - 12th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade