
Malware Terms
Authored by Travon Cordova
Computers
8th Grade
Used 569+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Software designed to HIJACK computers/devices?
Malware
Encryption
Brute Force Attack
Firewall
2.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
TECHNIQUES used by hackers to gain usernames and passwords?
Malware
Phisihing
Bots
BotNet
3.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
An ALTERED IP address or email that looks like a trusted source?
Worm
Ransomware
Spoofing
Adware
4.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
Encoding a message to make it secret or UNREADABLE?
Adware
Spoofing
Spam
Encryption
5.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
unsolicited (UNWANTED) random emails?
Spam
Adware
Ransomware
Remote Access Tool
6.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
ETHICAL Hackers who use their skills to find loopholes?
Black Hats
White Hats
Worm
Spam
7.
MULTIPLE CHOICE QUESTION
10 sec • 1 pt
HACKERS/SCAMMERS/INTERNET ATTACKERS
Worm
White Hats
Black Hats
Brute Force Attack
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?