
Threat Definition (9618 Computer Science)
Authored by North Tonsea
Computers
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A malicious code that activates only under specific conditions, such as on a certain date or when a program is launched.
VIRUS
WORM
BOT
LOGIC BOMB
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Software gathering information without user consent, often for advertising.
PHARMING
PHISHING
SPYWARE
TROJAN HORSE
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A scam attempts to steal personal information by pretending to be a trusted entity.
PHISHING
PHARMING
KEYLOGGER
LOGIC BOMB
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A malicious program that records every keystroke you type on your keyboard.
KEYLOGGER
PHARMING
PHISHING
LOGIC BOMB
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A malicious program that attaches itself to a file or application and spreads when the file is opened.
VIRUS
WORM
BOT
TROJAN HORSE
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A type of malware that disguises itself as a legitimate program, allowing unauthorized access.
TROJAN HORSE
BOT
PHISHING
WORM
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A program that can control a computer remotely without the user's awareness. An infected computer is called a zombie computer.
BOT
VIRUS
PHISHING
WORM
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?