Identifying Security Threats

Identifying Security Threats

Assessment

Flashcard

Computers

9th - 12th Grade

Easy

Created by

Kristine Cody

Used 1+ times

FREE Resource

Student preview

quiz-placeholder

21 questions

Show all answers

1.

FLASHCARD QUESTION

Front

A program that attaches to a host file with the goal of installing itself on a system.

Back

virus

2.

FLASHCARD QUESTION

Front

A program that reproduces itself and can transport from system to system without attaching to a file.

Back

worm

3.

FLASHCARD QUESTION

Front

Files that appear to be legitimate programs, but really contain malicious code.

Back

trojan

4.

FLASHCARD QUESTION

Front

A trojan that installs a backdoor for administrative control over the victim's PC.

Back

RAT

5.

FLASHCARD QUESTION

Front

Programs that create a mechanism for gaining access to a computer.

Back

backdoor

6.

FLASHCARD QUESTION

Front

What does the C2C server send to your PC to perform actions like sending spam, stealing information, or participating in a DDoS attack?

Back

BOTNET

7.

FLASHCARD QUESTION

Front

An attack that uses sophisticated methods to establish a presence on a system or network for an extended period of time.

Back

APT

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?