

A Leve Computer Science Malware
Presentation
•
Computers
•
12th Grade
•
Practice Problem
•
Easy
H Bryant
Used 2+ times
FREE Resource
27 Slides • 7 Questions
1
2
Word Cloud
Name one type of malware
3
4
5
6
7
8
9
10
11
12
Match
Match the following cyber-attack vectors
Domain Shadowing
Malvertising
SQL Injection
DDOS
Social Engineering
A technique used to deceive users into providing sensitive information
Online advertisements that contain malicious content
A code injection technique that exploits vulnerabilities in databases
A type of attack that aims to make a service unavailable
Manipulating individuals into divulging confidential information
A technique used to deceive users into providing sensitive information
Online advertisements that contain malicious content
A code injection technique that exploits vulnerabilities in databases
A type of attack that aims to make a service unavailable
Manipulating individuals into divulging confidential information
13
14
15
16
17
Open Ended
Phishing is the most common cyber-attack vector.
Explain what is meant by the term ‘cyber-attack vector’.
18
Open Ended
Describe two other cyber-attack vectors
19
20
Match
Match the following malware to their definitions
Virus
Trojan
Worm
Ransomware
Malicious software that replicates itself
A type of malware disguised as legitimate software
A self-replicating program that spreads across networks
Malware that demands payment to restore access
Malicious software that replicates itself
A type of malware disguised as legitimate software
A self-replicating program that spreads across networks
Malware that demands payment to restore access
21
22
23
24
25
26
27
28
29
30
31
32
33
Open Ended
Explain how worms differ from viruses in both how they spread and how they affect systems. [4 marks]
34
Open Ended
A user receives an email with a link to a “free game”. After clicking the link and installing the program, their keystrokes are recorded and sent to a remote server.
a) Identify the type of malware involved.
(1 mark)
b) Explain how this malware operates.
(3 marks)
Show answer
Auto Play
Slide 1 / 34
SLIDE
Similar Resources on Wayground
29 questions
3.4 Security Measures
Presentation
•
12th Grade - University
28 questions
Computer software
Presentation
•
University
27 questions
Developmental Day 2
Presentation
•
12th Grade
28 questions
CS Unit 3 T6 - Cloud Storage
Presentation
•
11th Grade
27 questions
revision of unit 3 grade12
Presentation
•
12th Grade
24 questions
Leccion 4. Uso de los conocimientos técnicos y de las TIC .
Presentation
•
12th Grade - University
29 questions
N4-5 Computer Systems Revision
Presentation
•
12th Grade
28 questions
VLAN
Presentation
•
11th Grade
Popular Resources on Wayground
16 questions
Grade 3 Simulation Assessment 2
Quiz
•
3rd Grade
19 questions
HCS Grade 5 Simulation Assessment_1 2526sy
Quiz
•
5th Grade
10 questions
Cinco de Mayo Trivia Questions
Interactive video
•
3rd - 5th Grade
17 questions
HCS Grade 4 Simulation Assessment_2 2526sy
Quiz
•
4th Grade
24 questions
HCS Grade 5 Simulation Assessment_2 2526sy
Quiz
•
5th Grade
13 questions
Cinco de mayo
Interactive video
•
6th - 8th Grade
20 questions
Math Review
Quiz
•
3rd Grade
30 questions
GVMS House Trivia 2026
Quiz
•
6th - 8th Grade