
Review - Unit 1.2 & 1.3 (Cybersecurity)
Authored by Lisa Zaranski
others
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 2 pts
A program that attaches itself to a host file and replicates itself on A system.
Virus
Worm
Trojan
Backdoor
2.
MULTIPLE CHOICE QUESTION
1 min • 2 pts
A program that reproduces itself and can transport from system TO system WITHOUT attaching to a file.
Virus
Worm
Trojan
Backdoor
3.
MULTIPLE CHOICE QUESTION
1 min • 2 pts
A files that appear to be legitimate programs, but really contain malicious code.
Virus
Worm
Trojan
Backdoor
4.
MULTIPLE CHOICE QUESTION
1 min • 2 pts
An attack that takes advantage of code flaws that have VERY recently been discovered.
Zero Day
Backdoor
Rootkit
Botnets
5.
MULTIPLE CHOICE QUESTION
1 min • 2 pts
A group of programs installed by an attacker to gain complete control of a computer.
Zero Day
Logic Bomb
Rootkit
Botnets
6.
MULTIPLE CHOICE QUESTION
1 min • 2 pts
A program that blocks access to files or use of the device until a ransom is paid.
Ransomware
Logic Bomb
Spyware
Adware
7.
MULTIPLE CHOICE QUESTION
1 min • 2 pts
Software that gathers data and forwards it to a third party without the consent or knowledge of the user.
Spyware
Logic Bomb
Ransomware
Addware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?