Computer Security & Malware Quiz Review

Computer Security & Malware Quiz Review

9th - 12th Grade

23 Qs

quiz-placeholder

Similar activities

3ro Inf-Soporte Técnico

3ro Inf-Soporte Técnico

12th Grade

20 Qs

Misión Internet Segura

Misión Internet Segura

9th - 12th Grade

21 Qs

M1D1-Definir antes de diseñar

M1D1-Definir antes de diseñar

12th Grade

19 Qs

MVCC-TechChallenge_HardwareSoftware-01

MVCC-TechChallenge_HardwareSoftware-01

9th - 12th Grade

22 Qs

CS1 Unit 2 Review 01

CS1 Unit 2 Review 01

10th - 12th Grade

23 Qs

Quiz # 1 Intro to Programming and Java History

Quiz # 1 Intro to Programming and Java History

11th - 12th Grade

20 Qs

Operating system

Operating system

12th Grade

20 Qs

Head of the Geeks!

Head of the Geeks!

5th Grade - Professional Development

22 Qs

Computer Security & Malware Quiz Review

Computer Security & Malware Quiz Review

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Medium

Created by

Sean Stewart

Used 60+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware that will provide you with targeted ads and online content, including pop-ups.

Spyware

Ransomware

Adware

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of software that monitors and records your keyboard keystrokes and mouse movements.

Zombie

Keylogger

Spyware

Scareware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of software that includes all malicious applications that can run on your computer.

DDoS

Logic Bomb

Rootkit

Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When many computers are used to attack a website in order to delay access to or crash the site itself.

Worm

DDoS

Cookie

Z-bots

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware will initiate its attack only when a certain condition is met, possibly a time or status change.

Phishing

Virus

Logic Bomb

Zombie

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These spread through a network's vulnerabilities without any human interaction and damage through replication

Worm

Trojan

Ransomware

Spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

E-mails pretending to be from legitimate businesses in order to get individuals to provide personal data, such as passwords.

Phishing

Spoofing

Virus

Keylogger

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?