Search Header Logo

Creating a Secure System (5.8 - 5.11)

Authored by Teagan Graves

Computers

9th - 12th Grade

Used 1+ times

Creating a Secure System (5.8 - 5.11)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is ransomware?

A type of antivirus software

Malicious software that encrypts files and demands a ransom

A program that enhances computer performance

A hardware component of a computer

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How does ransomware typically infect a computer?

By exploiting vulnerabilities in the computer's hardware

Through social engineering techniques, such as phishing emails

By physically damaging the computer's hard drive

Automatically through routine software updates

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary motivation behind a ransomware attack?

 To gain unauthorized access to a computer system

To spread the ransomware to as many computers as possible

To encrypt files and demand a ransom from the victim

To gather information for identity theft

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

 Once ransomware has encrypted files, how is the victim typically instructed to pay the ransom?

In person, at a designated location

Using a cryptocurrency such as Bitcoin

Through a bank transfer

By mailing a check to the attacker's address

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the best practice for dealing with a ransomware attack?

Pay the ransom immediately to get the files back

Contact law enforcement and report the attack

Ignore the attack and hope it goes away

Disconnect the infected computer from the internet

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What can individuals and organizations do to prevent ransomware attacks?

Share passwords with colleagues

Disable antivirus software

Keep software and operating systems up to date

Click on email attachments from unknown sources

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What term is used to describe a backup of important files that can be used to restore data in case of a ransomware attack?

Redundant data

Recovery snapshot

Ransomware-proof copy

Offline backup

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?