
2.0 Threats, Vulnerabilities, and Mitigations
Authored by Wayground Content
Social Studies
10th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Malware
Software that serves a malicious purpose, typically installed without the user's consent (or knowledge).
A type of software that enhances system performance and security.
An application designed to improve user productivity and efficiency.
A program that helps in managing computer hardware resources.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Worm
A type of malware that replicates between processes in system memory and can spread over client/server network connections.
A type of software that helps in managing system resources.
A program that is designed to harm or exploit any programmable device or network.
A tool used for data recovery and backup.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Blackmail
Demanding payment to prevent the release of information.
Offering a reward for information.
Requesting payment for a service rendered.
Threatening to disclose personal secrets for money.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Typosquatting
An attack where an attacker registers a domain name with a common misspelling of an existing domain.
A method of phishing that involves sending emails with fake links.
A technique used to improve website SEO by using popular keywords.
A form of malware that infects a user's computer through a web browser.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Unskilled attacker
A highly skilled hacker who creates their own tools.
An inexperienced attacker that typically uses tools or scripts created by others.
A professional security consultant who tests systems for vulnerabilities.
A government agent conducting surveillance on cybercriminals.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Unintentional or inadvertent insider threat
A threat actor that causes a vulnerability or exposes an attack vector without malicious intent.
A malicious insider who intentionally leaks sensitive information.
An external hacker attempting to breach a system.
A software bug that creates security vulnerabilities.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Spyware
Software that records information about a PC and its users, often installed without the user's consent.
A type of antivirus software that protects against malware.
A program that speeds up computer performance by cleaning up files.
A tool used for monitoring network traffic and performance.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?