3.02 Part II: Question Preview (ID: 20004)


Below is a preview of the questions contained within the game titled 3.02 PART II: Key Terms .To play games using this data set, follow the directions below. Good luck and have fun. Enjoy! [print these questions]


Play games to reveal the correct answers. Click here to play a game and get the answers.

Software that uses computer networks and security holes to replicate itself.
a) Virus
b) Trojan Horse
c) Worm
d) Phishing

Computer program hidden within the shell of another program with an alternative intent such as a virus.
a) Worm
b) Virus
c) Hacker
d) Trojan Horse

It is a person who gains unauthorized access to a computing device or network.
a) Hacker
b) Malware
c) Spyware
d) Trojan Horse

The act of masquerading as a trustworthy website or email to acquire user information; identity theft is the intent
a) Spyware
b) Phishing
c) Malware
d) Worm

It is malicious software meant to gain access, disrupt computer operation, or gather sensitive information.
a) Spyware
b) Phishing
c) Malware
d) Virus

It is a type of malware that collects user information by tracking the habits of users
a) Identity Fraud
b) Denial of Service (DoS) or Distributed Denial of Service (DDoS)
c) Malware
d) Spyware

An attempt to make a machine or network resource unavailable to its intended users
a) Adware
b) Antivirus Software
c) Denial of Service (DoS) or Distributed Denial of Service (DDoS)
d) Identity Fraud

A physical device or application designed to deny incoming or outgoing traffic on a network.
a) Authentication
b) Firewall
c) Botnet
d) Antivirus Software

Application used to prevent infection from risks.
a) Antivirus Software
b) Identity Fraud
c) Denial of Service (DoS) or Distributed Denial of Service (DDoS)
d) Hacker

Advertising software that automatically generates advertisements. It can be legitimately developed software but in some cases it can pose a threat.
a) Antivirus Software
b) Password
c) Authentication
d) Adware

A collection of internet-connected programs communicating with other similar programs in order to perform tasks. Botnets can be used to send spam or participate in a Distributed Denial of Service attacks.
a) Authentication
b) Password
c) Botnet
d) Spyware

A string of characters that allows access to a computer, interface, or system.
a) Authentication
b) Password
c) Botnet
d) Antivirus Software

The process of verifying that you are who you say you are
a) Authentication
b) Botnet
c) Password
d) Firewall

A piece of software that attaches itself to computer programs; viruses replicate and typically have a payload
a) Worm
b) Trojan Horse
c) Virus
d) Hacker

An attempt to use another person's identity to commit a crime.
a) Adware
b) Identity Fraud
c) Password
d) Authentication

Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from the data set above, visit ReviewGameZone.com and enter game ID number: 20004 in the upper right hand corner at ReviewGameZone.com or simply click on the link above this text.

TEACHERS / EDUCATORS
Log In
| Sign Up / Register