Search Header Logo

1st session

Authored by Salma Mohsen

Engineering

9th - 12th Grade

Used 12+ times

1st session
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

2 mins • 1 pt

attaches itself to a legitimate program or file and spreads when the infected file is executed. It can damage files, corrupt data,

Virus

Worm

Keylogger

Ransomware

2.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

They replicate themselves and spread across networks, often exploiting vulnerabilities in networked systems

3.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

disguise themselves as legitimate software or files but perform malicious actions once executed .they are often used to steal sensitive information, like passwords, or to give unauthorized access to attackers

4.

FILL IN THE BLANK QUESTION

2 mins • 1 pt

are tools that record the keystrokes typed by a user, often without their knowledge

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Through deceptive emails or websites

virus

Man in the middle

phishing

worm

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?