L7: Cybersecurity Threats Quiz

Quiz
•
Computers
•
University
•
Medium
Jerry Jackson Bent
Used 6+ times
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between a threat, vulnerability, and attack?
C. A threat is a deliberate act, a vulnerability is a possibility of an attack, and an attack is a weakness
B. A threat is a weakness, a vulnerability is a possibility of an attack, and an attack is a deliberate act
D. A threat is a weakness, a vulnerability is a deliberate act, and an attack is a possibility of an attack
A. A threat is a possibility of an attack, a vulnerability is a weakness, and an attack is a deliberate act
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
A. Software designed to enhance system performance
D. Software designed to enhance network speed
C. Software designed to improve network security
B. Software designed to interfere with system operation
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware can replicate independently and exploit vulnerabilities in networks?
D. Ransomware
C. Trojan horse
B. Worm
A. Virus
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main difference between a virus, worm, and trojan horse?
C. Viruses need human intervention, worms need human intervention, trojan horse can replicate independently
B. Viruses can replicate independently, worms need human intervention, trojan horse does not need to be attached to an executable file
D. Viruses can replicate independently, worms can replicate independently, trojan horse needs human intervention
A. Viruses need human intervention, worms can replicate independently, trojan horse does not need to be attached to an executable file
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware uses encryptions with unknown keys and locks down systems until a ransom is paid?
D. Ransomware
B. Worm
A. Virus
C. Trojan horse
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware can activate malicious code through triggers such as certain dates or times?
D. Spyware
A. Logic Bomb
C. Rootkit
B. Backdoor
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a backdoor malware?
B. To gain remote access to the computer
D. All of the above
A. To exploit the operating system's vulnerability
C. To modify access levels and system files
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
MTA: 98-367 Security Part 1

Quiz
•
KG - Professional Dev...
10 questions
Cyber Security

Quiz
•
University
11 questions
Blockchain & Cryptocurrency

Quiz
•
University
10 questions
Ethical, Security and Regulations in IS

Quiz
•
University
20 questions
Cyber Security

Quiz
•
5th Grade - Professio...
10 questions
Lesson 2 - Passing Data to Subsystems

Quiz
•
University
20 questions
Quiz sulla Sicurezza Informatica

Quiz
•
12th Grade - University
16 questions
Computer Security

Quiz
•
University
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
21 questions
Spanish-Speaking Countries

Quiz
•
6th Grade - University
20 questions
Levels of Measurements

Quiz
•
11th Grade - University
7 questions
Common and Proper Nouns

Interactive video
•
4th Grade - University
12 questions
Los numeros en español.

Lesson
•
6th Grade - University
7 questions
PC: Unit 1 Quiz Review

Quiz
•
11th Grade - University
7 questions
Supporting the Main Idea –Informational

Interactive video
•
4th Grade - University
12 questions
Hurricane or Tornado

Quiz
•
3rd Grade - University
7 questions
Enzymes (Updated)

Interactive video
•
11th Grade - University