Search Header Logo
Cybersecurity - Malware

Cybersecurity - Malware

Assessment

Presentation

Computers

8th Grade

Practice Problem

Easy

Created by

Ayomikun J Sodipe

Used 26+ times

FREE Resource

34 Slides • 31 Questions

1

media

2

media

3

media

4

QUESTIONS AHEAD

5

Multiple Choice

What is social engineering?

1


A type of computer virus

2


Manipulating people to obtain confidential information

3


A method of coding

4


A security protocol

6

Multiple Choice

Why is it important to train employees and students about social engineering?


1

To help understand how to give information online

2

To teach them coding skills

3

To improve customer service

4

To help them recognise and avoid manipulation tactics

7

Multiple Choice

What is the key difference between data and information?

1

Data is organized, while information is raw.

2

Data is raw, unprocessed facts, while information is processed and organized

3

Data is meaningful, while information is irrelevant.

4

Data and information are the same.

8

Open Ended

List the types of Social Engineering

9

media

10

media

11

media

12

media

13

QUESTIONS AHEAD

14

Multiple Choice

What is malware?

1

A type of computer hardware

2

A protective software that blocks viruses

3

Malicious software designed to damage or steal information

4

A program to speed up your computer

15

Open Ended

List 3 different types of malware?

16

Multiple Select

Which of these are types of malware?

1

Virus

2

Trojan

3

Firewall

4

Worm

17

Multiple Choice

What does malware do to a computer system?

1

Enhances system performance

2

Protects data from loss

3

Monitors hardware for maintenance

4

Infects the system to cause harm or steal data

18

TYPES OF MALWARE

19

media

20

media

21

media

22

media

23

media

24

media

25

QUESTIONS AHEAD

26

Multiple Choice

What is a virus?

1

A software that protects against threats

2

A software that monitors user activity

3

A program that encrypts files for ransom

4

A harmful program that attaches to files and spreads when they are opened

27

Multiple Choice

What is a worm?

1

A type of malware that disguises itself as legitimate software

2

A malicious program that steals personal information

3

A program that replicates itself and spreads across networks without user intervention

4

A type of adware that displays unwanted ads

28

Multiple Choice

What is a Trojan?

1

A program that appears legitimate but harms the system once installed

2

Malware that replicates itself

3

A type of ransomware that demands payment

4

Software that monitors internet traffic

29

Multiple Choice

What is ransomware?

1

A program that collects data about user behaviour

2

Malware that encrypts files and demands payment to unlock them

3

Software that improves system performance

4

A type of adware that shows pop-up ads

30

Multiple Choice

What is spyware?

1

Software that blocks malicious websites

2

Malware that secretly tracks user activities and collects personal information

3

A type of antivirus software

4

A program that creates backups of data

31

Multiple Choice

What is adware?

1

A program that secures network connections

2

Malware that steals passwords

3

A type of worm that spreads through email attachments

4

Software that displays unwanted ads and can track user activity

32

media

33

media

34

media

35

media

36

media

37

media

38

media

39

QUESTIONS AHEAD

40

Multiple Choice

How does malware commonly spread?

1

By downloading infected files

2

By clicking on harmless links

3

Through secure email attachments

4

By using trusted USB drives

41

Multiple Choice

What is one way malware can be spread through email?

1

Opening attachments from trusted sources

2

Ignoring spam messages

3

Opening email attachments from untrusted sources

4

Using strong passwords

42

Multiple Choice

What is a potential consequence of a malware infection?

1

Improved system speed

2

Unauthorised access to systems

3

Increased data storage

4

Enhanced security features

43

Multiple Choice

What financial risk can malware pose to individuals?

1

Free access to credit scores

2

Increased savings

3

Better investment opportunities

4

Financial losses and identity theft

44

Multiple Choice

How can data theft lead to identity theft?

1

By improving credit scores

2

By providing free access to bank accounts

3

By stealing personal information like National Insurance

4

By reducing online activity

45

media

46

media

47

media

48

media

49

media

50

QUESTION AHEAD

51

Multiple Choice

What is one effective way to protect your computer from malware?

1

Downloading free software from unknown sources

2

Ignoring software updates

3

Using strong, unique passwords

4

Opening email attachments from strangers

52

Multiple Choice

How can regular software updates help protect against malware?

1

They slow down your computer

2

They introduce new malware

3

They require you to pay fees

4

They patch security vulnerabilities

53

Multiple Choice

What role does antivirus software play in malware protection?

1

It detects, blocks, and removes malware

2

It speeds up internet connections

3

It monitors social media activity

4

It creates backups of your files

54

Multiple Choice

How can firewalls help protect against malware?

1

By monitoring and controlling network traffic

2

By increasing download speeds

3

By shutting down your computer

4

By installing additional software

55

Multiple Choice

What is a best practice when it comes to email attachments?

1

Open all attachments without hesitation

2

Only open attachments from trusted sources

3

Download all attachments automatically

4

Ignore any email with attachments

56

media

57

media

58

media

59

Multiple Choice

What is malware?

1

A type of computer hardware

2

Harmful software designed to damage or steal information

3

A program to speed up your computer

4

A protective software that blocks viruses

60

Multiple Choice

Which of the following is NOT a type of malware?

1

Virus

2

Worm

3

Firewall

4

Trojan

61

Multiple Choice

How does malware commonly spread

1

By downloading infected files

2

Through regular software updates

3

By using antivirus software

4

By opening secure email attachments

62

Multiple Choice

What is ransomware?

1

Software that monitors user activity

2

Malware that encrypts files and demands payment to unlock them

3

A type of adware that displays unwanted ads

4

A program that protects against threats

63

Multiple Choice

Which of the following can lead to malware infection?

1

Clicking on malicious links

2

Using strong passwords

3

Updating software regularly

4

Scanning for viruses

64

Multiple Choice

How can regular software updates help protect against malware?

1

They introduce new malware

2

They patch security vulnerabilities

3

They slow down your computer

4

They require you to pay fees

65

Open Ended

What are some best practices students should follow to help protect school systems from malware?

media

Show answer

Auto Play

Slide 1 / 65

SLIDE