
Cybersecurity - Malware
Presentation
•
Computers
•
8th Grade
•
Practice Problem
•
Easy
Ayomikun J Sodipe
Used 26+ times
FREE Resource
34 Slides • 31 Questions
1
2
3
4
QUESTIONS AHEAD
5
Multiple Choice
What is social engineering?
A type of computer virus
Manipulating people to obtain confidential information
A method of coding
A security protocol
6
Multiple Choice
Why is it important to train employees and students about social engineering?
To help understand how to give information online
To teach them coding skills
To improve customer service
To help them recognise and avoid manipulation tactics
7
Multiple Choice
What is the key difference between data and information?
Data is organized, while information is raw.
Data is raw, unprocessed facts, while information is processed and organized
Data is meaningful, while information is irrelevant.
Data and information are the same.
8
Open Ended
List the types of Social Engineering
9
10
11
12
13
QUESTIONS AHEAD
14
Multiple Choice
What is malware?
A type of computer hardware
A protective software that blocks viruses
Malicious software designed to damage or steal information
A program to speed up your computer
15
Open Ended
List 3 different types of malware?
16
Multiple Select
Which of these are types of malware?
Virus
Trojan
Firewall
Worm
17
Multiple Choice
What does malware do to a computer system?
Enhances system performance
Protects data from loss
Monitors hardware for maintenance
Infects the system to cause harm or steal data
18
TYPES OF MALWARE
19
20
21
22
23
24
25
QUESTIONS AHEAD
26
Multiple Choice
What is a virus?
A software that protects against threats
A software that monitors user activity
A program that encrypts files for ransom
A harmful program that attaches to files and spreads when they are opened
27
Multiple Choice
What is a worm?
A type of malware that disguises itself as legitimate software
A malicious program that steals personal information
A program that replicates itself and spreads across networks without user intervention
A type of adware that displays unwanted ads
28
Multiple Choice
What is a Trojan?
A program that appears legitimate but harms the system once installed
Malware that replicates itself
A type of ransomware that demands payment
Software that monitors internet traffic
29
Multiple Choice
What is ransomware?
A program that collects data about user behaviour
Malware that encrypts files and demands payment to unlock them
Software that improves system performance
A type of adware that shows pop-up ads
30
Multiple Choice
What is spyware?
Software that blocks malicious websites
Malware that secretly tracks user activities and collects personal information
A type of antivirus software
A program that creates backups of data
31
Multiple Choice
What is adware?
A program that secures network connections
Malware that steals passwords
A type of worm that spreads through email attachments
Software that displays unwanted ads and can track user activity
32
33
34
35
36
37
38
39
QUESTIONS AHEAD
40
Multiple Choice
How does malware commonly spread?
By downloading infected files
By clicking on harmless links
Through secure email attachments
By using trusted USB drives
41
Multiple Choice
What is one way malware can be spread through email?
Opening attachments from trusted sources
Ignoring spam messages
Opening email attachments from untrusted sources
Using strong passwords
42
Multiple Choice
What is a potential consequence of a malware infection?
Improved system speed
Unauthorised access to systems
Increased data storage
Enhanced security features
43
Multiple Choice
What financial risk can malware pose to individuals?
Free access to credit scores
Increased savings
Better investment opportunities
Financial losses and identity theft
44
Multiple Choice
How can data theft lead to identity theft?
By improving credit scores
By providing free access to bank accounts
By stealing personal information like National Insurance
By reducing online activity
45
46
47
48
49
50
QUESTION AHEAD
51
Multiple Choice
What is one effective way to protect your computer from malware?
Downloading free software from unknown sources
Ignoring software updates
Using strong, unique passwords
Opening email attachments from strangers
52
Multiple Choice
How can regular software updates help protect against malware?
They slow down your computer
They introduce new malware
They require you to pay fees
They patch security vulnerabilities
53
Multiple Choice
What role does antivirus software play in malware protection?
It detects, blocks, and removes malware
It speeds up internet connections
It monitors social media activity
It creates backups of your files
54
Multiple Choice
How can firewalls help protect against malware?
By monitoring and controlling network traffic
By increasing download speeds
By shutting down your computer
By installing additional software
55
Multiple Choice
What is a best practice when it comes to email attachments?
Open all attachments without hesitation
Only open attachments from trusted sources
Download all attachments automatically
Ignore any email with attachments
56
57
58
59
Multiple Choice
What is malware?
A type of computer hardware
Harmful software designed to damage or steal information
A program to speed up your computer
A protective software that blocks viruses
60
Multiple Choice
Which of the following is NOT a type of malware?
Virus
Worm
Firewall
Trojan
61
Multiple Choice
How does malware commonly spread
By downloading infected files
Through regular software updates
By using antivirus software
By opening secure email attachments
62
Multiple Choice
What is ransomware?
Software that monitors user activity
Malware that encrypts files and demands payment to unlock them
A type of adware that displays unwanted ads
A program that protects against threats
63
Multiple Choice
Which of the following can lead to malware infection?
Clicking on malicious links
Using strong passwords
Updating software regularly
Scanning for viruses
64
Multiple Choice
How can regular software updates help protect against malware?
They introduce new malware
They patch security vulnerabilities
They slow down your computer
They require you to pay fees
65
Open Ended
What are some best practices students should follow to help protect school systems from malware?
Show answer
Auto Play
Slide 1 / 65
SLIDE
Similar Resources on Wayground
60 questions
Dividing Integers
Presentation
•
7th Grade
60 questions
Bio Semester Review
Presentation
•
9th Grade
60 questions
Unit 9 Lesson 1
Presentation
•
9th Grade
58 questions
Moon Phase Notes
Presentation
•
8th Grade
60 questions
Planetary Properties
Presentation
•
8th Grade
58 questions
Revision
Presentation
•
9th Grade
56 questions
Social Engineering
Presentation
•
8th Grade
57 questions
Web Design L2 Remediation
Presentation
•
8th Grade
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade
Discover more resources for Computers
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
8 questions
Amoeba Sister Asexual vs Sexual Reproduction
Interactive video
•
8th Grade
15 questions
Pythagorean Theorem Word Problems Quizizz
Quiz
•
8th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
4 questions
Spring Break rest and recharge
Presentation
•
6th - 8th Grade
20 questions
Scatter Plots and Line of Best Fit
Quiz
•
8th Grade
19 questions
Introduction to Properties of Waves
Presentation
•
6th - 8th Grade
16 questions
Interactions within Ecosystems
Presentation
•
6th - 8th Grade