Module 2: Attacks, Concepts, and Techniques

Module 2: Attacks, Concepts, and Techniques

University

52 Qs

quiz-placeholder

Similar activities

2DO PARCIAL INFORMATICA 2

2DO PARCIAL INFORMATICA 2

University

49 Qs

UJIAN KKA

UJIAN KKA

10th Grade - University

50 Qs

Ag Power- Alternative Energy

Ag Power- Alternative Energy

9th Grade - University

50 Qs

Soal Ujian Akhir Cloud Computing (Ekstraksi Soal)

Soal Ujian Akhir Cloud Computing (Ekstraksi Soal)

University

50 Qs

IAS-Long Quiz

IAS-Long Quiz

University

50 Qs

ASAS INFORMATIKA 2025-2026

ASAS INFORMATIKA 2025-2026

10th Grade - University

50 Qs

UH Kelas 9 SK dan JKI

UH Kelas 9 SK dan JKI

9th Grade - University

50 Qs

ASAS Informatika Kelas 8 Semester Ganjil 2025/2026

ASAS Informatika Kelas 8 Semester Ganjil 2025/2026

8th Grade - University

50 Qs

Module 2: Attacks, Concepts, and Techniques

Module 2: Attacks, Concepts, and Techniques

Assessment

Quiz

Information Technology (IT)

University

Practice Problem

Medium

Created by

MARK LAWRENCE BOAQUIN

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

52 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

_____ is any code that can be used to steal data, bypass access controls, or cause harm to or compromise a system.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ monitors your online activity and can log every key you press on your keyboard, as well as capture almost any of your data, including sensitive personal information such as your online banking details.

Backdoor

Worm

Scareware

Spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ designed to automatically deliver advertisements to a user, most often on a web browser.

Scareware

Adware

Trojan Horse

Virus

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ used to gain unauthorized access by bypassing the normal authentication procedures to access a system.

Rootkit

Ransomware

Backdoor

Trojan Horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

_____ mainly consists of operating system style windows that pop up to warn you that your system is at risk and needs to run a specific program for it to return to normal operation.

Pretexting

Ransomware

Scareware

Adware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

____ takes advantage of software vulnerabilities to gain access to resources that normally shouldn’t be accessible (privilege escalation) and modify system files.

Backdoor

Virus

Rootkits

Worm

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer infected by a ____ has to be wiped and any required software reinstalled.

Spyware

Backdoor

Ransomware

Rootkit

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?