Search Header Logo

5. Protecting Against Threats

Authored by A Colley

Computers

8th Grade

Used 3+ times

5. Protecting Against Threats
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ransomware do to data until the victim pays a fee to decrypt it?

Encrypts

Records

Spreads

Replicates

Answer explanation

Ransomware encrypts data until the victim pays a fee to decrypt it, making the data inaccessible without the decryption key.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus is a type of _______ that attaches itself to files and then _______ itself to make more copies that _______ to other files and devices.

malware, replicates, spread

activity, encrypts, attacker

record, decrypt, pays a fee

attacker, records, encrypts

Answer explanation

The correct choice is 'malware, replicates, spread' as viruses are a type of malware that attach to files, replicate to make more copies, and spread to other files and devices.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spyware will _______ a user’s _______ and pass the information back to the _______.

record, activity, attacker

encrypt, data, victim

spread, files, device

replicate, information, virus

Answer explanation

Spyware will record a user’s activity and pass the information back to the attacker.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware attaches itself to files and replicates to spread to other files and devices?

Spyware

Ransomware

Virus

Trojan

Answer explanation

A virus is a type of malware that attaches itself to files and replicates to spread to other files and devices, distinguishing it from spyware, ransomware, and trojans.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main method used in a DDoS attack?

Flooding the targeted machine with lots of requests

Hacking into the system and stealing data

Sending phishing emails to users

Installing malware on the target machine

Answer explanation

The main method used in a DDoS attack is flooding the targeted machine with lots of requests, overwhelming its capacity and causing it to become unresponsive.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does an attacker take control of in a Distributed Denial-of-Service (DDoS) attack?

A. A single computer

B. A botnet

C. A server

D. A website

Answer explanation

In a Distributed Denial-of-Service (DDoS) attack, an attacker takes control of a botnet, which is a network of compromised computers used to flood a target with traffic and disrupt its services.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happens to the server during a DDoS attack?

A. It becomes faster

B. It gets upgraded

C. It can't cope and crashes

D. It gets more secure

Answer explanation

During a DDoS attack, the server can't cope with the overwhelming amount of traffic and crashes, making it unable to respond to legitimate requests.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?