Identifying Security Threats

Identifying Security Threats

Assessment

Flashcard

Computers

9th - 12th Grade

Hard

Created by

Kristine Cody

FREE Resource

Student preview

quiz-placeholder

21 questions

Show all answers

1.

FLASHCARD QUESTION

Front

A program that attaches to a host file with the goal of installing itself on a system.

Back

virus

2.

FLASHCARD QUESTION

Front

A program that reproduces itself and can transport from system to system without attaching to a file.

Back

worm

3.

FLASHCARD QUESTION

Front

Files that appear to be legitimate programs, but really contain malicious code.

Back

trojan

4.

FLASHCARD QUESTION

Front

A trojan that installs a backdoor for administrative control over the victim's PC.

Back

RAT

5.

FLASHCARD QUESTION

Front

Programs that create a mechanism for gaining access to a computer.

Back

backdoor

6.

FLASHCARD QUESTION

Front

What does the C2C server send to your PC to perform actions like sending spam, stealing information, or participating in a DDoS attack?

Back

BOTNET

7.

FLASHCARD QUESTION

Front

An attack that uses sophisticated methods to establish a presence on a system or network for an extended period of time.

Back

APT

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?