Search Header Logo
Malware

Malware

Assessment

Presentation

Computers

11th Grade

Medium

Created by

James Ainsworth

Used 4+ times

FREE Resource

0 Slides • 8 Questions

1

Multiple Choice

is also known as advertising-supported software. This is any software package which automatically shows adverts, such as pop-ups. It may also be in the user interface of a software package or on an installation screen., by itself, is harmless; however, some adware may include spyware such as key loggers.

1

Trojan

2

Adware

3

Spyware

4

Remote access Trojan

2

Multiple Choice

collect information and send it back to a third party. Algorithms are used to monitor keyboard use through, for example, pattern recognition.

Some will only collect keyboard strokes in

too new website or application. Others record every keyboard stroke including any information/ data that is cut and pasted.

1

Key logger

2

Spyware

3

Worm

4

Ransomware

3

Multiple Choice

are typically installed without user consent and remain hidden to avoid detection, allowing a hacker to control your device remotely. When a is connected to a digital system, the hacker can access and use the files and folders, login and personal details or use the connection to download viruses that could infect other digital systems.

1

Trojan

2

Virus

3

Worm

4

Remote access Trojan (RAT)

4

Multiple Choice

can restrict user access to the computer system by encrypting files or locking down the computer system. A message is usually displayed to force the user to pay so that the restrictions can be lifted and the user has access to the data/computer system. It is spread like a worm and can be started by downloading an infected file or by a vulnerability on the computer system

1

Worm

2

Virus

3

Ransomware

4

Spyware

5

Multiple Choice

is usually hidden from a user and can be difficult to detect. It is often secretly installed on a user's personal computer without their

knowledge. However, some such as key loggers may be installed to intentionally monitor users.

can also install additional software or redirect web browsers to different websites. Some can change computer settings which could lead to slow internet connection speeds or changes in web browser settings.

1

Ransomware

2

Adware

3

Key loggerz

4

Spyware

6

Multiple Choice

often appear to be something which is wanted or needed by the user of a digital system. They can be hidden in valid programs and

software. can make copies of themselves, steal information or harm their host digital system.

1

Virus

2

Trojan

3

Spyware

4

Worm

7

Multiple Choice

A computer program that replicates itself and spreads from computer to computer. can increase their chances of spreading to other

computersby infectingfiles on anetworkfilesystem orafilesystem that is accessedby other computers.

1

Virus

2

Trojan

3

Worm

4

Remote access Trojan (RAT)

8

Multiple Choice

can use a network to spread. Unlike a virus, it does not need to attach itself to an existing program. almost always cause some harm to a network, even if only by consuming bandwidth.

1

Key logger

2

Adware

3

Worm

4

Ransomware

is also known as advertising-supported software. This is any software package which automatically shows adverts, such as pop-ups. It may also be in the user interface of a software package or on an installation screen., by itself, is harmless; however, some adware may include spyware such as key loggers.

1

Trojan

2

Adware

3

Spyware

4

Remote access Trojan

Show answer

Auto Play

Slide 1 / 8

MULTIPLE CHOICE