Module 2: Attacks, Concepts, and Techniques

Quiz
•
Information Technology (IT)
•
University
•
Medium

MARK LAWRENCE BOAQUIN
Used 3+ times
FREE Resource
52 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
_____ is any code that can be used to steal data, bypass access controls, or cause harm to or compromise a system.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_____ monitors your online activity and can log every key you press on your keyboard, as well as capture almost any of your data, including sensitive personal information such as your online banking details.
Backdoor
Worm
Scareware
Spyware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_____ designed to automatically deliver advertisements to a user, most often on a web browser.
Scareware
Adware
Trojan Horse
Virus
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
____ used to gain unauthorized access by bypassing the normal authentication procedures to access a system.
Rootkit
Ransomware
Backdoor
Trojan Horse
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_____ mainly consists of operating system style windows that pop up to warn you that your system is at risk and needs to run a specific program for it to return to normal operation.
Pretexting
Ransomware
Scareware
Adware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
____ takes advantage of software vulnerabilities to gain access to resources that normally shouldn’t be accessible (privilege escalation) and modify system files.
Backdoor
Virus
Rootkits
Worm
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A computer infected by a ____ has to be wiped and any required software reinstalled.
Spyware
Backdoor
Ransomware
Rootkit
Create a free account and access millions of resources
Similar Resources on Wayground
47 questions
Exploring Mobile and Wireless Security

Quiz
•
University
55 questions
Cybersecurity Concepts Worksheet

Quiz
•
University
50 questions
UTS Digital Forensik

Quiz
•
University
50 questions
LatInfor

Quiz
•
11th Grade - University
50 questions
IAS1-FINAL EXAMINATION

Quiz
•
University
52 questions
Switching, layering

Quiz
•
University
50 questions
BSIT2102 PL Networking1 Tuando

Quiz
•
University
50 questions
Midterm 1 - Database Security Quiz

Quiz
•
University
Popular Resources on Wayground
18 questions
Writing Launch Day 1

Lesson
•
3rd Grade
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
40 questions
Algebra Review Topics

Quiz
•
9th - 12th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
19 questions
Handbook Overview

Lesson
•
9th - 12th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade