
Discuss worms, trojans and viruses, and the vulnerabilities that
Authored by Mark Gadsby
Computers
12th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
12 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 1 pt
Zeus, which was first detected in 2007 and has become one of the most damaging pieces of botnet
software in the world. Zeus originally stole passwords via Internet Explorer’s Password Store and if it
detected that the user was visiting a banking website, it would use keylogging techniques to discover
usernames and passwords. Zeus has hit computers at the Bank of America, NASA, and Amazon.
Because the Zeus uses malware to obtain sensitive information, it can also be classed as Spyware.
How many computers had Zeus infected by 2009?
Evaluate responses using AI:
OFF
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This malware can self-replicate.
Worm
Trojan
Virus
3.
OPEN ENDED QUESTION
3 mins • 1 pt
Melissa (1999) was an early example of computer malware that succeeded in mass infection. Melissa
was distributed as an email attachment, which once downloaded and opened, disabled a number of
safeguards in Microsoft Word. Melissa then used a macro to send email messages, using the user's
email application to forward the attachment onto the first 50 contacts in their address book. Melissa
reportedly caused $80 million of damage and overloaded the email servers of more than 300
organisations.
How many workplace computers were infected by Melissa?
Evaluate responses using AI:
OFF
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
At first glance this malware appears to be a useful program.
Worm
Trojan
Virus
5.
OPEN ENDED QUESTION
3 mins • 1 pt
Mydoom was launched in 2004 and became the fastest-spreading computer malware of its time. It
was transmitted via email and infected hosts, causing them to carry out a distributed denial-of-
service (DDoS) attack against several tech companies. It is estimated that Mydoom infected between
12 and 25% of emails in 2004 and caused approximately $38 billion worth of damage.
What type of malware is Mydoom?
Evaluate responses using AI:
OFF
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
This Malware can attach itself to an executable file.
Worm
Trojan
Virus
7.
OPEN ENDED QUESTION
3 mins • 1 pt
Heartbleed exploited a legitimate 'heartbeat' message sent by one computer to ensure that the
computer at the other end of a secure connection was still there. The 'heartbeat' is a short message
that is sent to the server, along with the number of characters in that message, and the server is
supposed to repeat the message back to confirm that it is still connected. However, in this case, the
code did not check the length of the message properly, and instead, relied on the number specified,
so attackers could request around 64,000 characters from the server's RAM, potentially including
sensitive information.
Which layer of the TCP/IP stack did the Heartbleed bug affect.
Evaluate responses using AI:
OFF
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?