Malware

Malware

6th - 8th Grade

15 Qs

quiz-placeholder

Similar activities

Computer's

Computer's

6th - 8th Grade

15 Qs

Y8 Project 3 - Different Forms of Network Attack and Malware

Y8 Project 3 - Different Forms of Network Attack and Malware

7th Grade

18 Qs

CamTech Network Security

CamTech Network Security

8th - 12th Grade

12 Qs

Y9 - Computer Science

Y9 - Computer Science

8th Grade

20 Qs

Virus, Worms and Trojan Horses

Virus, Worms and Trojan Horses

7th - 9th Grade

15 Qs

computer virus

computer virus

7th Grade

10 Qs

Cybersecurity

Cybersecurity

8th Grade

19 Qs

Unit 1 Cybersecurity

Unit 1 Cybersecurity

8th Grade

19 Qs

Malware

Malware

Assessment

Quiz

Computers

6th - 8th Grade

Hard

Created by

NICOLE STEPHENS

Used 3+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the secret method trojans use to sneak into your system?

By replicating themselves like a sci-fi clone army

By playing the ultimate trickster, convincing users to invite them in

By attaching themselves to executable files like a digital hitchhiker

By spreading through networks like wildfire

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Guess what! There's a sneaky type of malware that loves to spy on you, secretly collecting details about your internet adventures and every keystroke you make. Can you name it?

Viruses

Worms

Spyware

Trojans

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the sneaky purpose of ransomware?

To boost computer security to the max!

To sneakily gather all your secret info

To demand a hefty ransom for your precious data

To replicate itself like a sci-fi villain

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ready to test your cybersecurity smarts? Which sneaky type of malware cleverly requires a host file to spread its mischief?

Viruses

Worms

Trojans

Ransomware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Ready to test your cybersecurity smarts? What type of sneaky malware has the power to copy itself and launch an invasion on multiple computers across a network?

Viruses

Worms

Trojans

BOTS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do worms throw a party on a network?

By using peer-to-peer file sharing as their dance floor

By replicating themselves to fill up the guest list

By attaching to executable files like clinging to party balloons

By tricking users into executing them, like sneaking into the party

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the sneaky purpose of malware?

To throw a digital party

To be a cyber superhero

To pocket some digital cash, shh!

To turbocharge your computer

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?