
Online Safety and AI Awareness Quiz

Quiz
•
Information Technology (IT)
•
11th Grade
•
Easy
Alvin Joe D. Veloso
Used 10+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
You receive an email claiming you won a prize and asking you to download an attachment to claim it. After opening it, your files are ENCRYPTED. Which type of malware was most likely used?
Spyware
Worm
Trojan
Ransomware
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A user installs free software but notices that their search engine and homepage suddenly changed, and pop-up ads appear constantly. What is the most likely cause?
Rootkit
Adware
Worm
Keylogger
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A hospital's data has been locked by unknown attackers who demand payment in cryptocurrency. As a decision-maker, what would be the RISKIEST response to this attack?
Report the incident to the NBI Cybercrime Division
Pay the attackers to restore the data quickly
Disconnect the network and start incident containment
Restore from backup systems if available
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Why is the Trojan horse considered more deceptive than a virus or worm?
It self-replicates and spreads without user action
It appears legitimate and requires user activation
It does not damage the system
It's usually harmless but hard to detect
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
After a recent malware attack in a school system, administrators noticed unauthorized data transmissions and keystroke logs. Which malware was most likely responsible?
Keylogger
Trojan
Adware
Worm
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
In terms of propagation method, what makes worms more dangerous than traditional viruses?
They require user interaction to spread
They infect only media files
They consume bandwidth and replicate automatically
They can't spread through networks
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Analyze how the 'ILOVEYOU' virus became one of the most destructive malware events in history.
It attacked financial systems directly
It spread only through USBs and infected programs
It exploited emotional manipulation and email systems
It was created by a global cybercriminal network
Create a free account and access millions of resources
Similar Resources on Wayground
15 questions
Pengenalan Dasar Informatika

Quiz
•
11th Grade
15 questions
Pre Training Diagnostics Test CARDTP

Quiz
•
10th Grade - University
20 questions
Kelas 8 - Halaman 27 (UH Bab 2)

Quiz
•
8th Grade - University
20 questions
Pretest Riview pembelajaran sistem operasi dan komputer

Quiz
•
10th Grade - University
20 questions
ETECH 2ND QUARTER QUIZ

Quiz
•
9th - 12th Grade
20 questions
Web 3.7 Bacaan

Quiz
•
11th Grade
15 questions
Quiz 1-15

Quiz
•
9th - 12th Grade
15 questions
Uji Kompetensi : Penerapan dan Pengujian Jaringan Nirkabel

Quiz
•
9th - 12th Grade
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
6 questions
Rule of Law

Quiz
•
6th - 12th Grade
15 questions
ACT Math Practice Test

Quiz
•
9th - 12th Grade
18 questions
Hispanic Heritage Month

Quiz
•
KG - 12th Grade
28 questions
Ser vs estar

Quiz
•
9th - 12th Grade
10 questions
Would you rather...

Quiz
•
KG - University