

Cybercrime Test Review
Flashcard
•
Computers
•
8th Grade
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

9 questions
Show all answers
1.
FLASHCARD QUESTION
Front
Which of the following is NOT considered a phishing attack? Vishing, Email Phishing, Smishing
Back
Data Breach
2.
FLASHCARD QUESTION
Front
Social Engineering exploits which of the following? People, Networks, Systems
Back
People
3.
FLASHCARD QUESTION
Front
Malware attacks exploit which of the following? People, Networks, Systems
Back
Systems
4.
FLASHCARD QUESTION
Front
A ______ is two or more computers or devices that are connected in order to communicate and share data.
Back
Computer Network
5.
FLASHCARD QUESTION
Front
Which of the following are the correct steps in a social engineering attack? Prepare, exploit, infiltrate, disengage. Exploit, prepare, Infiltrate, disengage. Disengage, infiltrate, prepare, exploit. Prepare, infiltrate, exploit, disengage.
Back
Prepare, infiltrate, exploit, disengage
6.
FLASHCARD QUESTION
Front
This is a type of rootkit malware that attacks the computer's load-up system and hides in the system from users.
Back
Bootloader Rootkit
7.
FLASHCARD QUESTION
Front
What do malware attacks exploit?
Back
Systems
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?