Chapter 2 Intro to Cyber

Chapter 2 Intro to Cyber

9th Grade

10 Qs

quiz-placeholder

Similar activities

Network Security Y8 Starter

Network Security Y8 Starter

9th Grade

15 Qs

BTEC Tech Award DIT - Threats to Data

BTEC Tech Award DIT - Threats to Data

9th Grade

10 Qs

MALWAE AND ANTIVIRUS

MALWAE AND ANTIVIRUS

9th - 10th Grade

15 Qs

Virus, Worms and Trojan Horses

Virus, Worms and Trojan Horses

7th - 9th Grade

15 Qs

Cyber Security

Cyber Security

9th - 12th Grade

15 Qs

Malware Quiz

Malware Quiz

KG - University

15 Qs

cyber security

cyber security

9th Grade

11 Qs

OCR Malware CS

OCR Malware CS

KG - 10th Grade

7 Qs

Chapter 2 Intro to Cyber

Chapter 2 Intro to Cyber

Assessment

Quiz

Computers

9th Grade

Medium

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a malicious application accesses memory allocated to other processes

Access Control Problems

Race Conditions

Buffer Overflow

Weakness in Security Practices

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data coming into a program with malicious content, designed to force the program to behave in an unintended way

Race conditions

non-validated input

weakness in security practices

Buffer Overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Incorrectly regulating who does what and what they can do with resources

Race Conditions

Access Control Problems

Buffer Overflow

Non-validated input

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When developers attempt to create their own security applications

Access Control Problems

Buffer Overflow

Race Conditions

Weakness in Security Practices

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When the output of an event depends on ordered or timed outputs

Race Conditions

Weakness in Security Practices

Buffer Overflow

Access Control Problems

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware designed to automatically perform action, usually online

Bot

Worm

MitMo

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious code that replicates itself by independently exploiting vulnerabilities in networks

worm

spyware

scareware

adware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?