PRG3

PRG3

University

50 Qs

quiz-placeholder

Similar activities

Test 2

Test 2

University

50 Qs

BỘ 5 - TEST 4 - PART 5 - ETIME

BỘ 5 - TEST 4 - PART 5 - ETIME

11th Grade - Professional Development

45 Qs

S302P1TRI2

S302P1TRI2

University

53 Qs

Language Use (Vocabulary Review 002)

Language Use (Vocabulary Review 002)

University

50 Qs

WW7 R2

WW7 R2

6th Grade - University

55 Qs

bahasa inggris kelas 8

bahasa inggris kelas 8

8th Grade - University

50 Qs

Pronouns

Pronouns

University

45 Qs

Final Test Grammar

Final Test Grammar

University

50 Qs

PRG3

PRG3

Assessment

Quiz

English

University

Practice Problem

Easy

Created by

21070585 Anh

Used 12+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

50 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee installs software that secretly records passwords entered on their device. What type of malware is this?

Virus

Worm

Keylogger

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware that modifies web browser settings to redirect users to unwanted sites is called ________

Browser hijacker

Airplane hijacker

Adware

Spyware

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are two primary methods used to deliver ransomware?

Phishing emails

Software vulnerabilities

Pop-up ads

Hardware issues

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A worm needs user interaction to spread to other devices

True

False

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following are examples of malware? (Choose two)

Trojan

Spyware

Firewall

SSL

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A user notices unwanted pop-ups and advertisements while browsing. Which type of malware is likely responsible?

Adware

Trojan

Spyware

Ransomware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Leaving software unpatched in a public network environment can result in what kind of vulnerability?

Zero-day vulnerability

Insider threat

Password attack

Social engineering

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?