Cybersecurity Quiz 3

Cybersecurity Quiz 3

12th Grade

13 Qs

quiz-placeholder

Similar activities

Cyberessentials Chp. 3

Cyberessentials Chp. 3

Data Security Malware and Social Engineering

Data Security Malware and Social Engineering

Malware Types

Malware Types

Malware Quiz

Malware Quiz

Malware Quiz

Malware Quiz

Malware Quiz

Malware Quiz

Understanding Common Malware Types

Understanding Common Malware Types

Mrs. Mareus Cyber Security  2nd Period

Mrs. Mareus Cyber Security 2nd Period

Cybersecurity Quiz 3

Cybersecurity Quiz 3

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Benjamin Logan

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name for the type of software that generates revenue by generating annoying pop-ups?

A) trackers

B) adware

C) spyware

D) pop-ups

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What occurs on a computer when data goes beyond the limits of a buffer?

A) an SQL injection

B) a system exception

C) cross-site scripting

D) a buffer overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a rootkit modify?

A) operating system

B) programs

C) screen savers

D) Notepad

E) Microsoft Word

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a virus and a worm?

A) Viruses self-replicate but worms do not.

B) Worms self-replicate but viruses do not.

C) Worms require a host file but viruses do not.

D) Viruses hide in legitimate programs but worms do not.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack targets an SQL database using the input field of a user?

A) XML injection

B) Cross-site scripting

C) SQL injection

D) buffer overflow

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the meaning of the term logic bomb?

A) a malicious virus

B) a malicious worm

C) a malicious program that uses a trigger to awaken the malicious code

D) a malicious program that hides itself in a legitimate program

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?

A) adware

B) virus

C) phishing

D) spyware

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?