
FCODS for Kiddies
Authored by ITITIU21229 Nguyen Hoang Minh Khoi
Science
1st Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malicious code is the LOVELETTER attack?
Virus
Worm
Trojan
Advanced Malware
Answer explanation
ILOVEYOU, sometimes referred to as the Love Bug or Loveletter, was a computer worm that infected over ten million Windows personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs". But the thing is the program don't remember which computer it has sent the love letter to, so it repeat the sending process a million times on each computer => crash
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malicious code is WannaCry
RansomWare
Adware
Spyware
AdvancedMalware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malicious code is Zeus(zbot) ?
Virus
Worm
AdvancedMalware
TrojanHorse
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What do Mydoom,Sobig,KLEZ,CodeRed,SQLslammer and sasser have in common
They are all virus
They are all ransomware
They are all worm
They are all spyware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malicous code is CryptoLocker
Spyware
Adware
RansomeWare
Virus
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What makes zero-days attacks dangerous
The vendor or developer has only just learned of the aw which means they have zero days to fix it
The attacker has been attacking since the release of software(hence the name zero-days)
They are only harmful to outdated software
They rely on social engineering tactics
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How is man in the middle attack prevented ?
By implementing strong encryption and authentication protocols(certificates, digital signatures,...)
By regularly changing passwords
By using public Wi-Fi networks
By using weak encryption algorithms
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Scratch เบื้องต้น ม.1
Quiz
•
1st - 5th Grade
16 questions
security and ethical factors
Quiz
•
1st - 5th Grade
15 questions
Python Skills
Quiz
•
1st Grade - Professio...
10 questions
Afternoon Quiz
Quiz
•
1st - 2nd Grade
11 questions
INVERTEBRATES CLASSIFICATION
Quiz
•
1st - 3rd Grade
10 questions
Computers
Quiz
•
1st - 2nd Grade
10 questions
Life Cycle of a Butterfly Quiz
Quiz
•
1st - 3rd Grade
10 questions
Light Uses
Quiz
•
1st Grade
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Science
10 questions
Identifying Physical and Chemical Changes
Interactive video
•
1st - 5th Grade
10 questions
Exploring the 11 Human Body Systems
Interactive video
•
1st - 5th Grade
10 questions
Exploring Food Chains and Webs in Ecosystems
Interactive video
•
1st - 5th Grade
10 questions
Exploring the Conservation of Mass in Everyday Life
Interactive video
•
1st - 5th Grade
12 questions
Earthquakes, Landslides, and Volcanoes
Quiz
•
1st - 5th Grade
12 questions
Reduce, Reuse, and Recycle
Quiz
•
1st - 8th Grade