Search Header Logo

Computer Security and Malware Quiz

Authored by Jeric Logrosa

Computers

9th Grade - University

Used 1+ times

Computer Security and Malware Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the term for vulnerabilities that arise due to flaws in processor design, allowing attackers to exploit speculative execution?

2.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Which CPU vulnerability, discovered in 2018, exploits speculative execution to leak sensitive data?

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the hardware-based security feature used in modern processors to isolate sensitive memory regions?

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Which attack manipulates CPU branch prediction to execute unauthorized instructions?

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is the purpose of Data Execution Prevention (DEP) in computer security?

6.

FILL IN THE BLANK QUESTION

30 sec • 1 pt

Which type of memory corruption vulnerability occurs when a program writes more data to a buffer than it can hold?

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What technique does polymorphic malware use to change its code structure without altering its core functionality?

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?