Cybersecurity Quiz 3

Cybersecurity Quiz 3

12th Grade

13 Qs

quiz-placeholder

Similar activities

Understanding Trojans in Computer Security

Understanding Trojans in Computer Security

12th Grade - University

17 Qs

Parikh Day zero Quiz

Parikh Day zero Quiz

12th Grade

12 Qs

Keeping Data Safe & Secure

Keeping Data Safe & Secure

KG - 12th Grade

10 Qs

A1 Threat Types

A1 Threat Types

12th Grade

15 Qs

Information Systems 2

Information Systems 2

11th Grade - University

10 Qs

cybersecurity_1

cybersecurity_1

12th Grade

14 Qs

Network Security and Threats Quiz

Network Security and Threats Quiz

12th Grade

10 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Cybersecurity Quiz 3

Cybersecurity Quiz 3

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Benjamin Logan

FREE Resource

13 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the name for the type of software that generates revenue by generating annoying pop-ups?

A) trackers

B) adware

C) spyware

D) pop-ups

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What occurs on a computer when data goes beyond the limits of a buffer?

A) an SQL injection

B) a system exception

C) cross-site scripting

D) a buffer overflow

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a rootkit modify?

A) operating system

B) programs

C) screen savers

D) Notepad

E) Microsoft Word

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the difference between a virus and a worm?

A) Viruses self-replicate but worms do not.

B) Worms self-replicate but viruses do not.

C) Worms require a host file but viruses do not.

D) Viruses hide in legitimate programs but worms do not.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack targets an SQL database using the input field of a user?

A) XML injection

B) Cross-site scripting

C) SQL injection

D) buffer overflow

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the meaning of the term logic bomb?

A) a malicious virus

B) a malicious worm

C) a malicious program that uses a trigger to awaken the malicious code

D) a malicious program that hides itself in a legitimate program

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A criminal is using software to obtain information about the computer of a user. What is the name of this type of software?

A) adware

B) virus

C) phishing

D) spyware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers