
Week 3 Review Pt 2

Quiz
•
Computers
•
12th Grade
•
Easy
Ciara Williams
Used 1+ times
FREE Resource
30 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main difference between a virus and a worm?
A virus spreads by infecting files, while a worm propagates in memory and over networks.
A worm spreads by infecting files, while a virus propagates in memory and over networks.
A virus uses document macros to spread, while a worm does not.
A worm uses document macros to spread, while a virus does not.
Answer explanation
A virus spreads by infecting files, while a worm propagates in memory and over networks.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of virus does not use document macros to spread?
Macro virus
Worm
Trojan
Spyware
Answer explanation
A worm is a type of virus that does not use document macros to spread. Unlike macro viruses, worms can replicate and spread independently without relying on user interaction.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware self-replicates in memory and over computer networks?
Virus
Worm
Ransomware
Trojan
Answer explanation
Worms are a type of malware that self-replicates in memory and over computer networks, making them the correct choice for this question.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How can malware infect your computer through web browsing?
By exploiting a vulnerability in the software installed on your computer
By outdated hardware
By a properly configured firewall
By using a strong password
Answer explanation
By exploiting a vulnerability in the software installed on your computer
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a potential consequence of an improperly configured firewall?
It may allow prohibited network traffic into or out of a network
It may cause hardware failure
It may slow down the computer
It may prevent software updates
Answer explanation
An improperly configured firewall may allow prohibited network traffic into or out of a network, leading to security vulnerabilities.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a human vulnerability that can be exploited by malicious people during social engineering?
Ability to be deceived or tricked
Outdated software
Weak passwords
Unused OS features
Answer explanation
The human vulnerability of being deceived or tricked can be exploited by malicious individuals during social engineering attacks.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does configuring data back-ups provide in the context of ransomware attacks?
Reduces the attack surface
Prevents malware infection
Provides a mechanism to recover from a ransomware attack
Increases computer speed
Answer explanation
Configuring data back-ups provides a mechanism to recover from a ransomware attack, allowing for restoration of encrypted files without paying the ransom.
Create a free account and access millions of resources
Similar Resources on Wayground
25 questions
Application Software

Quiz
•
9th - 12th Grade
30 questions
Graphic Design

Quiz
•
9th - 12th Grade
25 questions
Types of Network and Defensive Design

Quiz
•
9th - 12th Grade
25 questions
Essential Windows Keyboard Shortcuts

Quiz
•
6th Grade - University
30 questions
Data Security Quiz

Quiz
•
8th Grade - University
25 questions
Computer Hardware Components - Identification

Quiz
•
8th - 12th Grade
25 questions
1.3.3 Networks - Protocols and Internet Structure

Quiz
•
12th Grade
25 questions
Digital Literacy Chapter 4 Review

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
20 questions
Brand Labels

Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World

Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
20 questions
ELA Advisory Review

Quiz
•
7th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns

Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade