
Foundations & Threats (C1)
Authored by Melody Kelley
Computers
9th - 12th Grade
Used 53+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Combining different forms of authentication to authenticate a user is called multi-factor authentication.
True
False
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Biometrics is an authentication method using measurement and analysis of a biological feature.
True
False
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Name for a secret or unknown access point of entry into a system.
Payload
Backdoor
Secure Cookie
Zero Day Vulnerability
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Name for the actions of malicious code.
Payload
Backdoor
Secure Cookie
Zero Day Vulnerability
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A flaw that exists in software when it is released and remains hidden until exploited by hackers.
Cookie
Zero Day Vulnerability
Keylogger
Trojan Horse
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A technology that tracks a user’s keystrokes on the keyboard.
Cookie
Zero Day Vulnerability
Keylogger
Trojan Horse
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Name for a type a virus that changes its characteristics to avoid detection.
Changling Worm
Trojan Horse
Logic Bomb
Polymorphic Virus
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?