Search Header Logo

FCODS for Kiddies

Authored by ITITIU21229 Nguyen Hoang Minh Khoi

Science

1st Grade

Used 1+ times

FCODS for Kiddies
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malicious code is the LOVELETTER attack?

Virus

Worm

Trojan

Advanced Malware

Answer explanation

Media Image

ILOVEYOU, sometimes referred to as the Love Bug or Loveletter, was a computer worm that infected over ten million Windows personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.TXT.vbs". But the thing is the program don't remember which computer it has sent the love letter to, so it repeat the sending process a million times on each computer => crash

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malicious code is WannaCry

RansomWare

Adware

Spyware

AdvancedMalware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malicious code is Zeus(zbot) ?

Virus

Worm

AdvancedMalware

TrojanHorse

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do Mydoom,Sobig,KLEZ,CodeRed,SQLslammer and sasser have in common

They are all virus

They are all ransomware

They are all worm

They are all spyware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malicous code is CryptoLocker

Spyware

Adware

RansomeWare

Virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What makes zero-days attacks dangerous

The vendor or developer has only just learned of the aw which means they have zero days to fix it

The attacker has been attacking since the release of software(hence the name zero-days)

They are only harmful to outdated software

They rely on social engineering tactics

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is man in the middle attack prevented ?

By implementing strong encryption and authentication protocols(certificates, digital signatures,...)

By regularly changing passwords

By using public Wi-Fi networks

By using weak encryption algorithms

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?