A standalone malware program that copies itself across computer networks is called a _____________?
Worm
Oops!
Check
Okay!
Check
15
What should you do if you are being bullied?
report the bully
Oops!
Check
Okay!
Check
15
A software program that monitors your computer usage without your knowledge:
spyware
Oops!
Check
Okay!
Check
15
What is the generic term for a piece of malicious code?
Malware
Oops!
Check
Okay!
Check
thief
Give points!
5
10
15
20
25
rocket
Go to first place!
Okay!
rocket
Go to first place!
Okay!
lifesaver
Give 5 points!
Oops!
15
A piece of code that copies itself is called a ____________________.
Virus
Oops!
Check
Okay!
Check
15
What does CIA stand for?
confidentially integrity availability
Oops!
Check
Okay!
Check
15
Cyberbullying is especially harmful due to specific characteristics: Which of these is because it can't be easily seen or overheard by teachers and parents.
Discreet
Oops!
Check
Okay!
Check
thief
Give points!
5
10
15
20
25
star
Double points!
Okay!
fairy
Take points!
5
10
15
20
25
baam
Lose 15 points!
Oops!
15
Victims of Cyberbullying often experience all but which of these ?
financial strain
Oops!
Check
Okay!
Check
15
The network of devices with the ability to connect and exchange data is known as ?
The internet of things
Oops!
Check
Okay!
Check
15
A collection of remotely controlled bots that launch attacks are called:
Bot Network
Oops!
Check
Okay!
Check
monster
Reset all scores!
Oops!
gold
Win 50 points!
Okay!
fairy
Take points!
5
10
15
20
25
banana
Go to last place!
Oops!
15
Using general knowledge of human behavior to trick users into breaking security rules is known as ?
Social Engineering
Oops!
Check
Okay!
Check
15
What is the term for a low-talent hacker who uses easy, well-known techniques to exploit Internet security vulnerabilities.
Script-Kiddie
Oops!
Check
Okay!
Check
15
A fix applied to a program which are known to solve security issues and are routinely released by programmers is called a _________________.