Cybersecurity 1

Cybersecurity 1

8th Grade

36 Qs

quiz-placeholder

Similar activities

IBA Lesson 3 Quiz

IBA Lesson 3 Quiz

8th Grade

40 Qs

Computer Components

Computer Components

6th - 8th Grade

38 Qs

Computing ethics HW

Computing ethics HW

8th Grade

37 Qs

Year 7 ICT and CS Basics

Year 7 ICT and CS Basics

8th Grade

36 Qs

Cyber quiz

Cyber quiz

7th - 8th Grade

32 Qs

20 Minute Exam Review

20 Minute Exam Review

6th - 8th Grade

38 Qs

ICT - Revision

ICT - Revision

5th - 8th Grade

40 Qs

FBLA Exploring Computer Science

FBLA Exploring Computer Science

6th - 12th Grade

40 Qs

Cybersecurity 1

Cybersecurity 1

Assessment

Quiz

Computers

8th Grade

Medium

Created by

Alex Brenon-Hodas

Used 1+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virus
An attack that takes advantage of code flaws that have VERY recently been discovered.
Data that has been encrypted
Scrambling data so that it looks like babble to anyone except those who know the trick to decoding it.
A program that attaches to a host file with the goal of installing itself on a system.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Worm
The program that manages all other applications on a computer (ex. Linux, Windows, Mac)
Trojan that installs a backdoor for administrative control over the victim PC.
When a database is exposed or stolen
A program that reproduces itself and can transport from system to system without attaching to a file.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Difference between virus and worm
A virus needs another program or host to replicate, but a worm can do it on its own.
A group of programs installed by an attacker to gain complete control of a computer.
Unsolicited commercial email, the electronic equivalent of the junk mail that comes through your mailbox.
Technology used to allow a computer to have more than one operating system (OS) present and operating at the same time on a single piece of hardware. - essentially running a computer inside another computer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Trojan
Using software programs which automate the process of rapidly testing all possible combinations of characters.
Protection against unauthorized access (part of the CIA triad)
Files that appear to be legitimate programs, but really contain malicious code.
A precise set of instructions that tells programs how to scramble and unscramble data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RAT (Remote Access Trojan)
Protection against unauthorized modification (part of the CIA triad)
The practice of hiding messages, so that the presence of the message itself is hidden (most common example: hiding text in images)
Physical objects that are embedded with sensors, software, and other technologies, and that connect and exchange data with other devices and systems over the Internet or networks.
Trojan that installs a backdoor for administrative control over the victim PC.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Backdoor
Testing a weak password against a large number of accounts.
The program that manages all other applications on a computer (ex. Linux, Windows, Mac)
Programs that create a mechanism for gaining
A program that blocks access to files or use of the device until a ransom is paid.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

access to a computer.
Scrambling data so that it looks like babble to anyone except those who know the trick to decoding it.
Uses a measurable physical characteristic to verify identity
Protection against unauthorized access (part of the CIA triad)
access to a computer.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?