Engineering Inside:

2016 issue 2

IEEE Spark Challenge

Welcome!

You have been chosen for Kylie's team.

Kylie's team Play Rules
Spark Bot

Rules

Think you know Spark? Test your knowledge on science and technology with the IEEE Spark Challenge!

The IEEE Spark Challenge Rules

  1. Players are automatically placed on one of the four Spark character teams.
  2. Points are earned by answering questions correctly.
    • For every question, you can earn up to 10 points. If you answer questions correctly on the first try, you will always gain 10 points.
    • Every time you answer a question incorrectly, 2 points will be subtracted from total amount you can earn per question. If you answer it correctly on the second try, you'll earn 8; on the third try, you'll earn 6; and so on.
    • After 5 wrong tries, you won't earn any points.
  3. Stumped? You may pass a question at any time if you don't know the answer.

Answer the questions right on the first try to earn the most points for your team. A leaderboard will show you which team is winning! Good Luck Spark Challengers!!

Play

The Teams

Teams

Question

Malicious code that copies itself and spreads to other computers without the use of a host file is known as a:
Check answer Check Answer Pass Next

The Score

Question

In what decade was the first worm released?
Check answer Check Answer Pass Next

The Score

Question

Spoofing involves an attacker using false data to pretend to be another person.
Check answer Check Answer Pass Next

The Score

Question

Clickjacking attacks that trick a user into clicking on a button or link on one webpage while they think they are clicking on another in order to hijack a user’s keystroke are also known as:
Check answer Check Answer Pass Next

The Score

Question

Virtual Dispersive Networking (VDN) is a technique developed to protect against:
Check answer Check Answer Pass Next

The Score

Question

Technologies that analyze phone calls to identify malicious behavior are known as:
Check answer Check Answer Pass Next

The Score

Question

A computer or network site that is created to attract hackers, allowing security experts to gather information on attacks and hackers is known as a:
Check answer Check Answer Pass Next

The Score

Question

Redirecting traffic in order to record and analyze the efforts of hackers is known as:
Check answer Check Answer Pass Next

The Score

Question

Seventy-one percent of passwords appear on the list of the top 1000 passwords.
Check answer Check Answer Pass Next

The Score

Congratulations!

You have finished this month's
Spark Quiz! Great job!

The Score