What term is used to describe software designed to disrupt computer operations or gain unauthorized access without the user's knowledge or permission?
Cybersecurity Quiz 3

Quiz
•
Computers
•
10th Grade
•
Hard
Tan Siewchoo
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Virus
Malware
Worm
Trojan horse
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do worms differ from viruses?
Worms require user initiation
Viruses can run independently
Worms always slow down networks
Viruses replicate by exploiting vulnerabilities
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main characteristic that distinguishes a Trojan horse from a virus?
Trojan horses infect executable files
Viruses require user initiation
Trojan horses bind to non-executable files
Viruses mutate to avoid detection
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware holds a computer system or its data captive until a payment is made?
Logic Bomb
Ransomware
Backdoor
Spyware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a browser hijacker?
To modify system files
To alter browser settings for redirection
To encrypt data on the computer
To replicate independently over networks
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary objective of social engineering attacks?
To exploit software vulnerabilities
To gain unauthorized access through technical means
To manipulate individuals into divulging information or performing actions
To launch malware attacks on computer networks
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is "pretexting" in the context of social engineering?
Requesting personal information in exchange for something
Lying to an individual to gain access to privileged data
Observing and picking up PINs through surveillance
Pretending to be a part of a large crowd to gain entry into a secure location
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Malware

Quiz
•
9th - 11th Grade
18 questions
Cybersecurity Vocabulary 2022

Quiz
•
9th - 12th Grade
20 questions
OCR J277 - 1.4 - Network Security - Knowledge Check

Quiz
•
10th Grade
20 questions
Computer and Network Security

Quiz
•
10th Grade
10 questions
GCSE OCR Computing 1.4.1 - Threats to Computer Systems

Quiz
•
10th Grade
15 questions
3.6 - Cyber Security

Quiz
•
10th Grade
15 questions
Cybersecurity

Quiz
•
9th - 12th Grade
10 questions
BTEC DIT C3 LAB - Device Hardening & Encryption

Quiz
•
10th - 11th Grade
Popular Resources on Quizizz
15 questions
Multiplication Facts

Quiz
•
4th Grade
20 questions
Math Review - Grade 6

Quiz
•
6th Grade
20 questions
math review

Quiz
•
4th Grade
5 questions
capitalization in sentences

Quiz
•
5th - 8th Grade
10 questions
Juneteenth History and Significance

Interactive video
•
5th - 8th Grade
15 questions
Adding and Subtracting Fractions

Quiz
•
5th Grade
10 questions
R2H Day One Internship Expectation Review Guidelines

Quiz
•
Professional Development
12 questions
Dividing Fractions

Quiz
•
6th Grade
Discover more resources for Computers
25 questions
Spanish preterite verbs (irregular/changed)

Quiz
•
9th - 10th Grade
10 questions
Juneteenth: History and Significance

Interactive video
•
7th - 12th Grade
8 questions
"Keeping the City of Venice Afloat" - STAAR Bootcamp, Day 1

Quiz
•
9th - 12th Grade
20 questions
Distance, Midpoint, and Slope

Quiz
•
10th Grade
20 questions
Figurative Language Review

Quiz
•
10th Grade
20 questions
Understanding Linear Equations and Slopes

Quiz
•
9th - 12th Grade