QUIZ ON MALWARE

QUIZ ON MALWARE

9th Grade

10 Qs

quiz-placeholder

Similar activities

Proyecto integrador 7A

Proyecto integrador 7A

7th - 9th Grade

10 Qs

Класифікація загроз безпеці та пошкодження даних у комп'ютер

Класифікація загроз безпеці та пошкодження даних у комп'ютер

8th - 9th Grade

13 Qs

Cyber Security

Cyber Security

9th - 11th Grade

13 Qs

Security of Data

Security of Data

9th - 11th Grade

15 Qs

Network Security

Network Security

9th Grade

13 Qs

Computer safety

Computer safety

6th - 9th Grade

10 Qs

ประเภท Malware

ประเภท Malware

9th - 12th Grade

6 Qs

Network security

Network security

8th - 9th Grade

10 Qs

QUIZ ON MALWARE

QUIZ ON MALWARE

Assessment

Quiz

Computers

9th Grade

Medium

Created by

Ronald Rigua

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What umbrella term encompasses viruses, worms, Trojans and spyware?

malware
spam
phishing
adware

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

This is a type of worm that appears to be legitimate but has malicious intent.

Trojan horse
Adware
Spyware
Ransomware

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of malicious software threatens to publish the victim's data or perpetually block access to it unless payment is made?

Ransomware
Trojan horse
Adware
Spyware

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of malware propagates by inserting a copy of itself into and becoming part of another program?

Trojan
Worm
Virus
Spyware

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is an adware?

Software that displays advertisements
Software that organizes files and folders
Software that blocks advertisements
Software that enhances computer security

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Which of the following below does not require a host program or human interaction to propagate?

virus

trojan horse

adware

worm

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What makes Trojans different from worms?

They spread through email attachments

They cannot replicate themselves and need human interaction

They are always designed to steal personal information
They only affect Mac computers

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?