
L7: Cybersecurity Threats Quiz
Authored by Jerry Jackson Bent
Computers
University
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between a threat, vulnerability, and attack?
C. A threat is a deliberate act, a vulnerability is a possibility of an attack, and an attack is a weakness
B. A threat is a weakness, a vulnerability is a possibility of an attack, and an attack is a deliberate act
D. A threat is a weakness, a vulnerability is a deliberate act, and an attack is a possibility of an attack
A. A threat is a possibility of an attack, a vulnerability is a weakness, and an attack is a deliberate act
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
A. Software designed to enhance system performance
D. Software designed to enhance network speed
C. Software designed to improve network security
B. Software designed to interfere with system operation
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware can replicate independently and exploit vulnerabilities in networks?
D. Ransomware
C. Trojan horse
B. Worm
A. Virus
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main difference between a virus, worm, and trojan horse?
C. Viruses need human intervention, worms need human intervention, trojan horse can replicate independently
B. Viruses can replicate independently, worms need human intervention, trojan horse does not need to be attached to an executable file
D. Viruses can replicate independently, worms can replicate independently, trojan horse needs human intervention
A. Viruses need human intervention, worms can replicate independently, trojan horse does not need to be attached to an executable file
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware uses encryptions with unknown keys and locks down systems until a ransom is paid?
D. Ransomware
B. Worm
A. Virus
C. Trojan horse
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware can activate malicious code through triggers such as certain dates or times?
D. Spyware
A. Logic Bomb
C. Rootkit
B. Backdoor
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a backdoor malware?
B. To gain remote access to the computer
D. All of the above
A. To exploit the operating system's vulnerability
C. To modify access levels and system files
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?