1.2.2 Security aspects

1.2.2 Security aspects

8th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Malware

Malware

9th - 11th Grade

15 Qs

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

Networks Recap Quiz

Networks Recap Quiz

8th Grade

19 Qs

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

ST 1

ST 1

12th Grade

15 Qs

Cyber security

Cyber security

9th - 12th Grade

20 Qs

Security Threats

Security Threats

10th Grade - University

20 Qs

CYBER SAFETY

CYBER SAFETY

9th Grade

20 Qs

1.2.2 Security aspects

1.2.2 Security aspects

Assessment

Quiz

Computers

8th - 12th Grade

Medium

Created by

Serkan Oektem

Used 12+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A type of malicious code or software that looks legitimate but can take control of your computer. It is designed to damage, disrupt, steal, or in general inflict some other harmful action on your data or network.

Harmware

Trojan horse (virus)

Phishing

DDOS

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Often attached or concealed in shared or downloaded files, both executable files—a program that runs script—and non-executable files such as a Word document or an image file.

Virus

Hacking

Keylogger

Adware

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Once it has entered into a computer system, usually via a network connection or as a downloaded file, it can then run, self-replicate and propagate without a triggering event.

Worm

Harmware

Hacker

Keylogger

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Virus remains dormant until the infected host file is activated.

True

False

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Worms do require the activation of their host file.

True

False

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following is an example of a spyware?

Keylogger

Phishing

Virus

Worm

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

A piece of code intentionally inserted into a computer system that will set off a malicious function such as deleting files when specified conditions are met.

Keylogger

Logic bomb

DDOS

Worm

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?