WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

10th Grade

19 Qs

quiz-placeholder

Similar activities

Security Threats

Security Threats

10th Grade - University

20 Qs

Computer Crimes and Computer Ethics

Computer Crimes and Computer Ethics

6th - 10th Grade

21 Qs

OCR IT. Unit 3 - Cyber Security. LO2 test:

OCR IT. Unit 3 - Cyber Security. LO2 test:

11th - 12th Grade

20 Qs

CYBERpatriot quiz

CYBERpatriot quiz

9th - 12th Grade

21 Qs

Hackers?

Hackers?

University

20 Qs

Digital Media - Chapter 1

Digital Media - Chapter 1

9th - 12th Grade

20 Qs

BTEC IT Unit 1 - D threats to data & laws

BTEC IT Unit 1 - D threats to data & laws

11th - 12th Grade

20 Qs

Cyber Security

Cyber Security

9th - 12th Grade

20 Qs

WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Jordan Firth

Used 11+ times

FREE Resource

19 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

Provides users with advertisements

Worm

A type of malicious software designed to block access to a system

Virus

Software that secretly monitors user activity

Ransomware

A self-replicating program that spreads across networks

Spyware

Attaches to files, spreads when download

Adware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common way mobile devices get infected with malware?

Scanning QR codes

Downloading apps from official app stores

Sending text messages

Using public Wi-Fi networks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware infects the computer without the user's knowledge and will duplicate itself to slow the computer down?

Worm

Virus

Trojan horse

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a hacker that hacks with malicious intent?

Black hat hacker

Grey hat hacker

White hat hacker

Blue hat hacker

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware replicates itself on a system by modifying programs and inserting their own code?

Worm

Virus

Trojan horse

Adware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form of attack is designed to bombard servers with useless requests until they become unresponsive?

Distributed Denial of Service (DDoS)

Brute force attack

Packet sniffing

SQL injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method of malware distribution via email called?

Phishing

Firewalling

Spamming

Scareware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?