Search Header Logo
A Leve Computer Science Malware

A Leve Computer Science Malware

Assessment

Presentation

Computers

12th Grade

Practice Problem

Easy

Created by

H Bryant

Used 2+ times

FREE Resource

27 Slides • 7 Questions

1

media

2

Word Cloud

Name one type of malware

3

media

4

media

5

media

6

media

7

media

8

media

9

media

10

media

11

media

12

Match

Question image

Match the following cyber-attack vectors

Domain Shadowing

Malvertising

SQL Injection

DDOS

Social Engineering

A technique used to deceive users into providing sensitive information

Online advertisements that contain malicious content

A code injection technique that exploits vulnerabilities in databases

A type of attack that aims to make a service unavailable

Manipulating individuals into divulging confidential information

13

media

14

media

15

media

16

media

17

Open Ended

Question image

Phishing is the most common cyber-attack vector.

Explain what is meant by the term ‘cyber-attack vector’.

18

Open Ended

Describe two other cyber-attack vectors

19

media

20

Match

Question image

Match the following malware to their definitions

Virus

Trojan

Worm

Ransomware

Malicious software that replicates itself

A type of malware disguised as legitimate software

A self-replicating program that spreads across networks

Malware that demands payment to restore access

21

media

22

media

23

media

24

media

25

media

26

media

27

media

28

media

29

media

30

media

31

media

32

media

33

Open Ended

Explain how worms differ from viruses in both how they spread and how they affect systems. [4 marks]

34

Open Ended

A user receives an email with a link to a “free game”. After clicking the link and installing the program, their keystrokes are recorded and sent to a remote server.

a) Identify the type of malware involved.
(1 mark)
b) Explain how this malware operates.
(3 marks)

media

Show answer

Auto Play

Slide 1 / 34

SLIDE