_____ is any code that can be used to steal data, bypass access controls, or cause harm to or compromise a system.
Module 2: Attacks, Concepts, and Techniques

Quiz
•
Information Technology (IT)
•
University
•
Medium

MARK LAWRENCE BOAQUIN
Used 3+ times
FREE Resource
52 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_____ monitors your online activity and can log every key you press on your keyboard, as well as capture almost any of your data, including sensitive personal information such as your online banking details.
Backdoor
Worm
Scareware
Spyware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_____ designed to automatically deliver advertisements to a user, most often on a web browser.
Scareware
Adware
Trojan Horse
Virus
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
____ used to gain unauthorized access by bypassing the normal authentication procedures to access a system.
Rootkit
Ransomware
Backdoor
Trojan Horse
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
_____ mainly consists of operating system style windows that pop up to warn you that your system is at risk and needs to run a specific program for it to return to normal operation.
Pretexting
Ransomware
Scareware
Adware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
____ takes advantage of software vulnerabilities to gain access to resources that normally shouldn’t be accessible (privilege escalation) and modify system files.
Backdoor
Virus
Rootkits
Worm
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A computer infected by a ____ has to be wiped and any required software reinstalled.
Spyware
Backdoor
Ransomware
Rootkit
Create a free account and access millions of resources
Similar Resources on Quizizz
50 questions
PRELIM EXAMINATION ON LIVING IN THE IT ERA

Quiz
•
University
50 questions
IAS1-FINAL EXAMINATION

Quiz
•
University
52 questions
Switching, layering

Quiz
•
University
50 questions
BSIT2102 PL Networking1 Tuando

Quiz
•
University
49 questions
Pre-FINAL EXAM

Quiz
•
University
50 questions
Кәсіби ағылшын 1 - 50

Quiz
•
University
47 questions
Exploring Mobile and Wireless Security

Quiz
•
University
50 questions
UTS Digital Forensik

Quiz
•
University
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade