Technical Terms - Internet (A-Z) - Botnet

Technical Terms - Internet (A-Z) - Botnet

12th Grade

10 Qs

quiz-placeholder

Similar activities

ISAC Quiz Day 2 (Types of Computers)

ISAC Quiz Day 2 (Types of Computers)

KG - University

15 Qs

Fundamentals of CS - Computers in the Modern World

Fundamentals of CS - Computers in the Modern World

8th - 12th Grade

10 Qs

Web/System Exploitation

Web/System Exploitation

1st Grade - Professional Development

9 Qs

Hackers and Cyber Attacks

Hackers and Cyber Attacks

9th - 12th Grade

11 Qs

Technical Terms - Hardware (A-Z) - Multi-Core

Technical Terms - Hardware (A-Z) - Multi-Core

12th Grade

10 Qs

Year 9 Unit 3.1 Packet Switching &Protocols End of Unit Quiz

Year 9 Unit 3.1 Packet Switching &Protocols End of Unit Quiz

12th Grade

12 Qs

IT Basics

IT Basics

9th - 12th Grade

15 Qs

[AP CSP] Binary Conversion

[AP CSP] Binary Conversion

9th - 12th Grade

14 Qs

Technical Terms - Internet (A-Z) - Botnet

Technical Terms - Internet (A-Z) - Botnet

Assessment

Quiz

Computers

12th Grade

Hard

Created by

OXFORD SCHOOL

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a botnet?

A group of computers used for distributed computing

A group of computers used for scientific processing

A group of computers controlled by multiple sources

A group of computers controlled by a single source

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are computers compromised to create a malicious botnet?

By exploiting a security hole through a firewall

By exploiting a security hole through an operating system

By exploiting a security hole through a chat program

By exploiting a security hole through a Web browser

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can a hacker do once access to several computers is gained?

Run manual programs on all systems at the same time

Run manual programs on one system at a time

Run automated programs on all systems at the same time

Run automated programs on one system at a time

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some purposes for which a hacker may create a botnet?

Spreading viruses, sending e-mail spam, and hacking databases

Spreading malware, sending e-mail spam, and crashing Web servers

Spreading malware, sending e-mail spam, and hacking databases

Spreading viruses, sending e-mail spam, and crashing Web servers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can large botnets be detected and dismantled?

By triggering an alert at ISPs due to unusual bandwidth usage

By using a rootkit attack

By avoiding the use of multiple computers

By hiding the activity within regular processes

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why do users often not know that their computers are part of a botnet?

Because hackers hide their intrusion within regular processes

Because hackers reveal their intrusion openly

Because users have strong firewalls

Because users are always aware of botnet activity

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is recommended to prevent computers from becoming part of a botnet?

Avoiding the use of the Internet and turning off the computer

Installing antivirus software and regularly checking for intrusions

Installing antivirus software and turning off the firewall

Avoiding the use of the Internet and using a VPN

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?