Cyber Defense Quiz

Cyber Defense Quiz

20 Qs

quiz-placeholder

Similar activities

Quiz: Programming a Calculator. Part 1 and Part 2 Review

Quiz: Programming a Calculator. Part 1 and Part 2 Review

7th - 8th Grade

17 Qs

dasar desain grafis

dasar desain grafis

1st Grade

15 Qs

Javascript mine

Javascript mine

7th Grade

15 Qs

BÀI THI THỬ MÔN TIN HỌC LỚP 4

BÀI THI THỬ MÔN TIN HỌC LỚP 4

1st - 8th Grade

20 Qs

flowol week 3

flowol week 3

9th - 12th Grade

17 Qs

2.3.1 Graph Traversal & Path Finding Algorithms

2.3.1 Graph Traversal & Path Finding Algorithms

12th Grade - University

20 Qs

Practice Quiz QBASIC and Excel Functions

Practice Quiz QBASIC and Excel Functions

5th Grade

20 Qs

Kuis Pemrograman Dasar

Kuis Pemrograman Dasar

University

20 Qs

Cyber Defense Quiz

Cyber Defense Quiz

Assessment

Quiz

Computers

Practice Problem

Hard

Created by

Ms B

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer ____ is a malicious code which self-replicates by copying itself to other applications.

download

program

virus

worm

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main function of a keylogger?

Logs all attempts to access a file.

Records keystrokes made on a keyboard.

Records keys used for encryption.

Steals passwords and keys that are saved on your computer.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a virus and a worm?

A worm spreads by attacking systems with weak passwords and a virus attacks systems that have not been updated.

A virus can infect operating systems but a worm cannot.

A virus can assist with other attacks but a worm cannot.

A worm spreads by itself but a virus must attach to another program.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack plays on the fact that users are usually the weakest link in security?

Cross Site Scripting

Rootkit

Social Engineering

Spyware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the field of computer science, what is meant by the term zombie?

Remotely controlled hosts

Hackers that work at night

Antivirus software that is out of date or has expired

Viruses that remain on a system, but are no longer active

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a zero-day vulnerability?

A flaw that is hidden from the software vendor and taken advantage of by attackers.

A flaw that is dismissed because it does not have the appropriate priority.

A high-priority flaw that takes less than a day to discover and exploit.

A flaw that is known by the software vendor, but has not been addressed or fixed.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following programming languages is associated with XSS?

CSS

HTML

JavaScript

SQL

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?