Understanding Malware Types - yr8

Understanding Malware Types - yr8

9th - 12th Grade

21 Qs

quiz-placeholder

Similar activities

Chapter 2: The Internet and World Wide Web

Chapter 2: The Internet and World Wide Web

12th Grade

18 Qs

Operating Systems

Operating Systems

5th Grade - University

20 Qs

Computer Threats Quiz

Computer Threats Quiz

10th Grade

20 Qs

Viruses and Malware

Viruses and Malware

7th - 9th Grade

20 Qs

Malware and Computer Security Quiz

Malware and Computer Security Quiz

10th Grade

20 Qs

Utility Software

Utility Software

KG - University

22 Qs

Storage Devices & Media

Storage Devices & Media

8th - 9th Grade

18 Qs

1.2.2 Secondary Storage

1.2.2 Secondary Storage

10th - 11th Grade

20 Qs

Understanding Malware Types - yr8

Understanding Malware Types - yr8

Assessment

Interactive Video

Computers

9th - 12th Grade

Hard

Created by

Manisha Sanghani

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ransomware do to the files on an infected machine?

Moves them to a different folder

Copies them

Encrypts them

Deletes them

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is paying the ransom for ransomware usually not a good idea?

It is too expensive

It requires a credit card

The hacker might not release the decryption key

It takes too long

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the origin of the name 'trojan' in computer malware?

A Greek city

A type of ancient Greek ship

A Greek legend about a wooden horse

A famous Greek philosopher

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What can trojans do once they are activated?

Send spam emails

Delete or damage data

Encrypt files

Install updates

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of spyware?

To display advertisements

To delete data

To collect and log information

To encrypt files

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does spyware help hackers bypass password encryption?

By changing the encryption method

By creating fake passwords

By deleting the encryption

By logging keystrokes and sending data back to the hacker

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a computer worm designed to do?

Display advertisements

Copy itself and spread to other computers

Delete data

Encrypt files

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?