â
Matching Challenge: Threats, Vulnerabilities, and Malware
Learnlo
Back to Dashboard
Computer Security (Cybersecurity): Threats, Vulnerabilities, and Malware
May 12, 2026
â˘
Learning
Expires in 89 days
Study Now
Flashcards
Study Shuffle
Content
Summary
Topics
Insights
Conclusions
Mind Map
More Content (4)
AI Audio
Slideshow
Podcast
Test Yourself
Comprehensive Exam
Practice
Best
Flashcards
0%
Quiz
0%
Speed Quiz
0%
Games
Best
Cloze Game
0%
Matching Game
0%
Matching Challenge: Threats, Vulnerabilities, and Malware
Match each item on the left with its corresponding item on the right!
âąď¸ Time:
2:00
â Matched:
0 / 10
đĽ Streak:
0
đŻ Score:
0
Match These:
Computer security (cybersecurity)
CVE (Common Vulnerabilities and Exposures)
Exploitable vulnerability
Denial-of-service (DoS)
Backdoors
Eavesdropping and network confidentiality
Man-in-the-middle (MITM)
A vulnerability exists in a system (flaw in structure/execution/functioning/oversight).
Backdoor is present (secret bypass of authentication/security controls).
Eavesdropping occurs on unsecured/un-encrypted network traffic.
With These: