9 spr1 Cybersecurity Lesson 1

9 spr1 Cybersecurity Lesson 1

8th Grade

12 Qs

quiz-placeholder

Similar activities

Computer Security

Computer Security

7th - 10th Grade

12 Qs

Virus, Worms and Trojan Horses

Virus, Worms and Trojan Horses

7th - 9th Grade

15 Qs

Malware Terms

Malware Terms

8th Grade

15 Qs

Year 8 - Malware & Social Engineering

Year 8 - Malware & Social Engineering

6th - 8th Grade

10 Qs

Malware

Malware

8th Grade

11 Qs

Ιοί Υπολογιστών

Ιοί Υπολογιστών

7th - 9th Grade

11 Qs

computer security threats

computer security threats

8th Grade

16 Qs

Risks, Precautions & Laws

Risks, Precautions & Laws

8th Grade

12 Qs

9 spr1 Cybersecurity Lesson 1

9 spr1 Cybersecurity Lesson 1

Assessment

Quiz

Computers

8th Grade

Medium

Created by

Thomas Reynolds

Used 8+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of malware is active if a user's computer has been locked and is displaying a message demanding payment to unlock it?
Ransomware
Adware
Trojan Horse
Worm

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does adware do?
Shows adverts, e.g., intrusive popups. May contain other malware.
Takes control of a system.
Appears to be useful but installs additional malware.
Collects data and sends it back to a third party.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the difference between a virus and a worm?
A virus spreads by attaching itself to files; a worm can self-replicate.
A worm spreads by attaching itself to files; a virus can self-replicate
A virus is a standalone program, whereas a worm attaches to other files.
A worm is a standalone program, whereas a virus attaches to other files.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does a bot do?
Takes control of a system and can form part of a botnet.
Appears to be useful but installs additional malware.
Enables an unauthorised user to gain control without being detected.
Shows adverts, e.g., intrusive popups.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does spyware do?
Collects data and sends it back to a third party.
Takes control of a system.
Appears to be useful but installs additional malware.
Enables an unauthorised user to gain control without being detected.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does a Trojan horse do?
Appears to be useful but installs additional malware.
Takes control of a system.
Collects data and sends it back to a third party.
Enables an unauthorised user to gain control without being detected.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Why would someone want to steal or destroy data?
Data is valuable.
They are bored.
It's a school assignment.
They don't know how to create data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?