Search Header Logo

L7: Cybersecurity Threats Quiz

Authored by Jerry Jackson Bent

Computers

University

Used 8+ times

L7: Cybersecurity Threats Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a threat, vulnerability, and attack?

C. A threat is a deliberate act, a vulnerability is a possibility of an attack, and an attack is a weakness

B. A threat is a weakness, a vulnerability is a possibility of an attack, and an attack is a deliberate act

D. A threat is a weakness, a vulnerability is a deliberate act, and an attack is a possibility of an attack

A. A threat is a possibility of an attack, a vulnerability is a weakness, and an attack is a deliberate act

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is malware?

A. Software designed to enhance system performance

D. Software designed to enhance network speed

C. Software designed to improve network security

B. Software designed to interfere with system operation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware can replicate independently and exploit vulnerabilities in networks?

D. Ransomware

C. Trojan horse

B. Worm

A. Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between a virus, worm, and trojan horse?

C. Viruses need human intervention, worms need human intervention, trojan horse can replicate independently

B. Viruses can replicate independently, worms need human intervention, trojan horse does not need to be attached to an executable file

D. Viruses can replicate independently, worms can replicate independently, trojan horse needs human intervention

A. Viruses need human intervention, worms can replicate independently, trojan horse does not need to be attached to an executable file

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware uses encryptions with unknown keys and locks down systems until a ransom is paid?

D. Ransomware

B. Worm

A. Virus

C. Trojan horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware can activate malicious code through triggers such as certain dates or times?

D. Spyware

A. Logic Bomb

C. Rootkit

B. Backdoor

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a backdoor malware?

B. To gain remote access to the computer

D. All of the above

A. To exploit the operating system's vulnerability

C. To modify access levels and system files

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?