
Creating a Secure System (5.8 - 5.11)
Authored by Teagan Graves
Computers
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is ransomware?
A type of antivirus software
Malicious software that encrypts files and demands a ransom
A program that enhances computer performance
A hardware component of a computer
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How does ransomware typically infect a computer?
By exploiting vulnerabilities in the computer's hardware
Through social engineering techniques, such as phishing emails
By physically damaging the computer's hard drive
Automatically through routine software updates
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the primary motivation behind a ransomware attack?
To gain unauthorized access to a computer system
To spread the ransomware to as many computers as possible
To encrypt files and demand a ransom from the victim
To gather information for identity theft
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Once ransomware has encrypted files, how is the victim typically instructed to pay the ransom?
In person, at a designated location
Using a cryptocurrency such as Bitcoin
Through a bank transfer
By mailing a check to the attacker's address
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the best practice for dealing with a ransomware attack?
Pay the ransom immediately to get the files back
Contact law enforcement and report the attack
Ignore the attack and hope it goes away
Disconnect the infected computer from the internet
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What can individuals and organizations do to prevent ransomware attacks?
Share passwords with colleagues
Disable antivirus software
Keep software and operating systems up to date
Click on email attachments from unknown sources
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What term is used to describe a backup of important files that can be used to restore data in case of a ransomware attack?
Redundant data
Recovery snapshot
Ransomware-proof copy
Offline backup
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
36 questions
PEKAN ULANGAN HARIAN RPL
Quiz
•
12th Grade
40 questions
SIMULASI DIGITAL - X
Quiz
•
KG - Professional Dev...
45 questions
CiM Media Sectors and Products
Quiz
•
10th Grade
37 questions
HTML VÀ CẤU TRÚC WEB
Quiz
•
12th Grade
45 questions
TEST YOUR SKILLS
Quiz
•
10th Grade
45 questions
LATIHAN SOAL TIK KELAS IX
Quiz
•
9th Grade
40 questions
Grade 6-Sistem Komputer
Quiz
•
6th Grade - University
35 questions
Kuis Aplikasi Kamus Digital
Quiz
•
8th Grade - University
Popular Resources on Wayground
7 questions
History of Valentine's Day
Interactive video
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
15 questions
Valentine's Day Trivia
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
Discover more resources for Computers
10 questions
Exploring Valentine's Day with Charlie Brown
Interactive video
•
6th - 10th Grade
18 questions
Valentines Day Trivia
Quiz
•
3rd Grade - University
20 questions
El Verbo IR Practice
Quiz
•
9th Grade
20 questions
-AR -ER -IR present tense
Quiz
•
10th - 12th Grade
10 questions
Valentine's Day History and Traditions
Interactive video
•
6th - 10th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
20 questions
Exponent Properties
Quiz
•
9th Grade
21 questions
Presidents Day Trivia
Quiz
•
6th - 12th Grade