Week 3 Review Pt 2

Week 3 Review Pt 2

12th Grade

30 Qs

quiz-placeholder

Similar activities

Computer Terms

Computer Terms

9th - 12th Grade

25 Qs

Computer Hardware

Computer Hardware

9th - 12th Grade

25 Qs

CompTIA A+ U10

CompTIA A+ U10

9th Grade - Professional Development

27 Qs

COMPTIA ITF

COMPTIA ITF

1st Grade - Professional Development

29 Qs

12 Chapter No 1 Operating System

12 Chapter No 1 Operating System

12th Grade

25 Qs

Dig Lit - OS Basics - 4.1 Test

Dig Lit - OS Basics - 4.1 Test

12th Grade

33 Qs

Intro to IT Ch 4 1-4 Quiz Review

Intro to IT Ch 4 1-4 Quiz Review

9th - 12th Grade

25 Qs

Digital Literacy Final

Digital Literacy Final

9th - 12th Grade

25 Qs

Week 3 Review Pt 2

Week 3 Review Pt 2

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Ciara Williams

Used 1+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between a virus and a worm?

A virus spreads by infecting files, while a worm propagates in memory and over networks.

A worm spreads by infecting files, while a virus propagates in memory and over networks.

A virus uses document macros to spread, while a worm does not.

A worm uses document macros to spread, while a virus does not.

Answer explanation

A virus spreads by infecting files, while a worm propagates in memory and over networks.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of virus does not use document macros to spread?

Macro virus

Worm

Trojan

Spyware

Answer explanation

A worm is a type of virus that does not use document macros to spread. Unlike macro viruses, worms can replicate and spread independently without relying on user interaction.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware self-replicates in memory and over computer networks?

Virus

Worm

Ransomware

Trojan

Answer explanation

Worms are a type of malware that self-replicates in memory and over computer networks, making them the correct choice for this question.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can malware infect your computer through web browsing?

By exploiting a vulnerability in the software installed on your computer

By outdated hardware

By a properly configured firewall

By using a strong password

Answer explanation

By exploiting a vulnerability in the software installed on your computer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential consequence of an improperly configured firewall?

It may allow prohibited network traffic into or out of a network

It may cause hardware failure

It may slow down the computer

It may prevent software updates

Answer explanation

An improperly configured firewall may allow prohibited network traffic into or out of a network, leading to security vulnerabilities.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a human vulnerability that can be exploited by malicious people during social engineering?

Ability to be deceived or tricked

Outdated software

Weak passwords

Unused OS features

Answer explanation

The human vulnerability of being deceived or tricked can be exploited by malicious individuals during social engineering attacks.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does configuring data back-ups provide in the context of ransomware attacks?

Reduces the attack surface

Prevents malware infection

Provides a mechanism to recover from a ransomware attack

Increases computer speed

Answer explanation

Configuring data back-ups provides a mechanism to recover from a ransomware attack, allowing for restoration of encrypted files without paying the ransom.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers