Search Header Logo

Malware Terms

Authored by Travon Cordova

Computers

8th Grade

Used 553+ times

Malware Terms
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Software designed to HIJACK computers/devices?

Malware

Encryption

Brute Force Attack

Firewall

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

TECHNIQUES used by hackers to gain usernames and passwords?

Malware

Phisihing

Bots

BotNet

3.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

An ALTERED IP address or email that looks like a trusted source?

Worm

Ransomware

Spoofing

Adware

4.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Encoding a message to make it secret or UNREADABLE?

Adware

Spoofing

Spam

Encryption

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

unsolicited (UNWANTED) random emails?

Spam

Adware

Ransomware

Remote Access Tool

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

ETHICAL Hackers who use their skills to find loopholes?

Black Hats

White Hats

Worm

Spam

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

HACKERS/SCAMMERS/INTERNET ATTACKERS

Worm

White Hats

Black Hats

Brute Force Attack

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?