Search Header Logo

2.0 Threats, Vulnerabilities, and Mitigations

Authored by Wayground Content

Social Studies

10th Grade

2.0 Threats, Vulnerabilities, and Mitigations
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware

Software that serves a malicious purpose, typically installed without the user's consent (or knowledge).

A type of software that enhances system performance and security.

An application designed to improve user productivity and efficiency.

A program that helps in managing computer hardware resources.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Worm

A type of malware that replicates between processes in system memory and can spread over client/server network connections.

A type of software that helps in managing system resources.

A program that is designed to harm or exploit any programmable device or network.

A tool used for data recovery and backup.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Blackmail

Demanding payment to prevent the release of information.

Offering a reward for information.

Requesting payment for a service rendered.

Threatening to disclose personal secrets for money.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Typosquatting

An attack where an attacker registers a domain name with a common misspelling of an existing domain.

A method of phishing that involves sending emails with fake links.

A technique used to improve website SEO by using popular keywords.

A form of malware that infects a user's computer through a web browser.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unskilled attacker

A highly skilled hacker who creates their own tools.

An inexperienced attacker that typically uses tools or scripts created by others.

A professional security consultant who tests systems for vulnerabilities.

A government agent conducting surveillance on cybercriminals.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Unintentional or inadvertent insider threat

A threat actor that causes a vulnerability or exposes an attack vector without malicious intent.

A malicious insider who intentionally leaks sensitive information.

An external hacker attempting to breach a system.

A software bug that creates security vulnerabilities.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Spyware

Software that records information about a PC and its users, often installed without the user's consent.

A type of antivirus software that protects against malware.

A program that speeds up computer performance by cleaning up files.

A tool used for monitoring network traffic and performance.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?