
chap 3 cisco 3
Authored by Midnight Velasquez
Other
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are two common indicators of spam mail?
The email has keywords in it.
The email has misspelled words or punctuation errors or both.
The email has no subject line.
The email is from a friend.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the term used to describe an email that is targeting a specific person employed at a financial institution?
spear phishing
target phishing
spyware
spam
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website?
smishing
impersonation
spam
grayware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does a rootkit modify?
screen savers
programs
Microsoft Word
operating system
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the name given to a program or program code that bypasses normal authentication?
virus
worm
backdoor
Trojan
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?
a type of worm
a type of logic bomb
a type of ransomware
a type of virus
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the difference between a virus and a worm?
Viruses self-replicate but worms do not.
Worms require a host file but viruses do not.
Viruses hide in legitimate programs but worms do not.
Worms self-replicate but viruses do not.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?