Search Header Logo

Cybersecurity 1

Authored by Alex Brenon-Hodas

Computers

8th Grade

Used 2+ times

Cybersecurity 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Virus

An attack that takes advantage of code flaws that have VERY recently been discovered.
Data that has been encrypted
Scrambling data so that it looks like babble to anyone except those who know the trick to decoding it.
A program that attaches to a host file with the goal of installing itself on a system.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Worm

The program that manages all other applications on a computer (ex. Linux, Windows, Mac)
Trojan that installs a backdoor for administrative control over the victim PC.
When a database is exposed or stolen
A program that reproduces itself and can transport from system to system without attaching to a file.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Difference between virus and worm

A virus needs another program or host to replicate, but a worm can do it on its own.
A group of programs installed by an attacker to gain complete control of a computer.
Unsolicited commercial email, the electronic equivalent of the junk mail that comes through your mailbox.
Technology used to allow a computer to have more than one operating system (OS) present and operating at the same time on a single piece of hardware. - essentially running a computer inside another computer

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Trojan

Using software programs which automate the process of rapidly testing all possible combinations of characters.
Protection against unauthorized access (part of the CIA triad)
Files that appear to be legitimate programs, but really contain malicious code.
A precise set of instructions that tells programs how to scramble and unscramble data.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

RAT (Remote Access Trojan)

Protection against unauthorized modification (part of the CIA triad)
The practice of hiding messages, so that the presence of the message itself is hidden (most common example: hiding text in images)
Physical objects that are embedded with sensors, software, and other technologies, and that connect and exchange data with other devices and systems over the Internet or networks.
Trojan that installs a backdoor for administrative control over the victim PC.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Backdoor

Testing a weak password against a large number of accounts.
The program that manages all other applications on a computer (ex. Linux, Windows, Mac)
Programs that create a mechanism for gaining
A program that blocks access to files or use of the device until a ransom is paid.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

access to a computer.

Scrambling data so that it looks like babble to anyone except those who know the trick to decoding it.
Uses a measurable physical characteristic to verify identity
Protection against unauthorized access (part of the CIA triad)
access to a computer.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?