Review - Unit 1.2 & 1.3  (Cybersecurity)

Review - Unit 1.2 & 1.3 (Cybersecurity)

22 Qs

quiz-placeholder

Similar activities

Unit 2 - Level C - Completing the Sentence

Unit 2 - Level C - Completing the Sentence

KG - University

20 Qs

Company Hierarchies and Common Positions Quiz

Company Hierarchies and Common Positions Quiz

10th Grade

20 Qs

5 Fields of Social Studies & 5 Themes of Geography

5 Fields of Social Studies & 5 Themes of Geography

KG - University

18 Qs

Topic 2 Review

Topic 2 Review

12th Grade

19 Qs

1.2 On the Move

1.2 On the Move

KG - University

19 Qs

Review: The Age of Jackson

Review: The Age of Jackson

KG - University

21 Qs

Russia Unit Test

Russia Unit Test

6th Grade

20 Qs

A Young Tinkerer Quiz

A Young Tinkerer Quiz

KG - University

20 Qs

Review - Unit 1.2 & 1.3  (Cybersecurity)

Review - Unit 1.2 & 1.3 (Cybersecurity)

Assessment

Quiz

others

Hard

Created by

Lisa Zaranski

Used 2+ times

FREE Resource

AI

Enhance your content

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

22 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A program that attaches itself to a host file and replicates itself on A system.
Virus
Worm
Trojan
Backdoor

2.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A program that reproduces itself and can transport from system TO system WITHOUT attaching to a file.
Virus
Worm
Trojan
Backdoor

3.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A files that appear to be legitimate programs, but really contain malicious code.
Virus
Worm
Trojan
Backdoor

4.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

An attack that takes advantage of code flaws that have VERY recently been discovered.
Zero Day
Backdoor
Rootkit
Botnets

5.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A group of programs installed by an attacker to gain complete control of a computer.
Zero Day
Logic Bomb
Rootkit
Botnets

6.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

A program that blocks access to files or use of the device until a ransom is paid.
Ransomware
Logic Bomb
Spyware
Adware

7.

MULTIPLE CHOICE QUESTION

1 min • 2 pts

Software that gathers data and forwards it to a third party without the consent or knowledge of the user.
Spyware
Logic Bomb
Ransomware
Addware

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?