Chapter 2 Intro to Cyber

Chapter 2 Intro to Cyber

9th Grade

10 Qs

quiz-placeholder

Similar activities

Malware Quiz

Malware Quiz

9th - 12th Grade

10 Qs

APCSP IOC-2.C Cybersecurity Threats

APCSP IOC-2.C Cybersecurity Threats

9th - 12th Grade

15 Qs

Nice Computer Quiz

Nice Computer Quiz

7th - 12th Grade

10 Qs

Cyber Security–Encryption & Prevention Measures Homework

Cyber Security–Encryption & Prevention Measures Homework

7th - 9th Grade

15 Qs

Fraud

Fraud

KG - Professional Development

13 Qs

AP CSP Vocab Quiz BI 1, 2

AP CSP Vocab Quiz BI 1, 2

9th - 12th Grade

11 Qs

ICDL IT Security Recap (Quiz)

ICDL IT Security Recap (Quiz)

9th Grade

15 Qs

U1 Digital Information Vocab

U1 Digital Information Vocab

9th - 12th Grade

12 Qs

Chapter 2 Intro to Cyber

Chapter 2 Intro to Cyber

Assessment

Quiz

Computers

9th Grade

Medium

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When a malicious application accesses memory allocated to other processes

Access Control Problems

Race Conditions

Buffer Overflow

Weakness in Security Practices

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data coming into a program with malicious content, designed to force the program to behave in an unintended way

Race conditions

non-validated input

weakness in security practices

Buffer Overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Incorrectly regulating who does what and what they can do with resources

Race Conditions

Access Control Problems

Buffer Overflow

Non-validated input

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When developers attempt to create their own security applications

Access Control Problems

Buffer Overflow

Race Conditions

Weakness in Security Practices

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When the output of an event depends on ordered or timed outputs

Race Conditions

Weakness in Security Practices

Buffer Overflow

Access Control Problems

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware designed to automatically perform action, usually online

Bot

Worm

MitMo

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious code that replicates itself by independently exploiting vulnerabilities in networks

worm

spyware

scareware

adware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?