Identifying Security Threats

Identifying Security Threats

Assessment

Flashcard

Computers

9th - 12th Grade

Easy

Created by

Kristine Cody

Used 2+ times

FREE Resource

Student preview

quiz-placeholder

21 questions

Show all answers

1.

FLASHCARD QUESTION

Front

a program that attaches to a host file with the goal of installing itself on a system

Back

virus

2.

FLASHCARD QUESTION

Front

a program that reproduces itself and can transport from system to system without attaching to a file

Back

worm

3.

FLASHCARD QUESTION

Front

files that appear to be legitimate programs, but really contain malicious code

Back

trojan

4.

FLASHCARD QUESTION

Front

a trojan that installs a backdoor for administrative control over the victim's PC

Back

RAT

5.

FLASHCARD QUESTION

Front

programs that create a mechanism for gaining access to a computer

Back

backdoor

6.

FLASHCARD QUESTION

Front

the C2C server sends your PC program code to perform an action such as sending out spam or stealing information or participating in a DDoS attack

Back

BOTNET

7.

FLASHCARD QUESTION

Front

an attack that uses sophisticated methods to establish a presence on a system or network for an extended period of time.

Back

APT

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?