
Identifying Security Threats
Authored by Kristine Cody
Computers
9th - 12th Grade
Used 37+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a program that attaches to a host file with the goal of installing itself on a system
virus
worm
malware
trojan
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a program that reproduces itself and can transport from system to system without attaching to a file
virus
worm
malware
trojan
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
files that appear to be legitimate programs, but really contain malicious code
virus
worm
malware
trojan
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a trojan that installs a backdoor for administrative control over the victim's PC
RAT
BOTNET
SPAM
PUP/PUA
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
programs that create a mechanism for gaining access to a computer
backdoor
vulnerability window
spyware
ransomware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
the C2C server sends your PC program code to perform an action such as sending out spam or stealing information or participating in a DDoS attack
BOTNET
PUP/PUA
SPAM
APT
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
an attack that uses sophisticated methods to establish a presence on a system or network for an extended period of time.
BOTNET
PUP/PUA
SPAM
APT
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?