Search Header Logo
Untitled Presentation

Untitled Presentation

Assessment

Presentation

Computers

10th Grade

Practice Problem

Hard

Created by

Jeremy Gonzaga

FREE Resource

14 Slides • 14 Questions

1

media

2

Multiple Choice

Question image

Imagine Daniel received an email with an attachment claiming to be an important document from his bank. What is the primary method through which ransomware could infect Daniel's computer if he opens the attachment?

1

By physically tampering with Daniel's computer hardware.

2

Through unsecured Wi-Fi networks.

3

By downloading the infected attachment or clicking malicious links in the email.

4

Through official app store downloads.

3

media

4

Multiple Choice

What are the main purposes of malware as described in the image?

1

To steal sensitive information

2

To enhance computer performance

3

To create software applications

4

To disrupt operations of computers

5

media

6

Open Ended

List the types of threats categorized under 'Infiltrators & Spies'.

7

media

8

Multiple Choice

What is the key trait of a Trojan?

1

Requires a human action to spread

2

Deception is its primary weapon

3

Malicious code that attaches to files

4

Disguised as legitimate software

9

media

10

Multiple Choice

What is the modus operandi of spyware?

1

Collects sensitive information without consent

2

Burrows deep into a system

3

Provides administrative-level access

4

Monitors user activity

11

media

12

Multiple Choice

What is the modus operandi of a Worm?

1

A self-replicating program that spreads automatically through networks.

2

Locks or encrypts a user's files, making them inaccessible.

3

Automatically displays unwanted or malicious advertisements.

4

A network of infected devices remotely controlled by an attacker.

13

media

14

Multiple Choice

What are the common attack vectors for malware infiltration?

1

Networks

2

Downloads

3

Email

4

Unsafe User Practices

15

media

16

Multiple Choice

What are some signs that your system may be compromised?

1

Performance Degradation

2

Unauthorized Changes

3

Network Activity

4

Anomalous Behavior

17

media

18

Multiple Choice

What is the main idea of the Defense Protocol?

1

It is a single tool for defense

2

It is a system of vigilant habits and protections

3

It is not necessary for digital life

4

It is only for physical security

19

media

20

Multiple Choice

What is the importance of regularly updating your operating system and applications?

1

It prevents malware attacks

2

It improves internet speed

3

It enhances graphics performance

4

It reduces battery consumption

21

media

22

Multiple Choice

How do antivirus programs contribute to network security?

1

By monitoring network traffic speed.

2

By encrypting data stored on the network.

3

By detecting, preventing, and removing malware from network devices.

4

By increasing the bandwidth of the network.

23

media

24

Multiple Choice

What are the three core principles of human defense against security breaches?

1

Safe Browsing

2

Responsible Downloading

3

Email Caution

4

Data Encryption

25

media

26

media

27

Multiple Choice

What does the phrase 'Stay Informed. Stay Secure.' imply about the importance of vigilance?

1

It is unnecessary to be vigilant

2

Vigilance is only important in emergencies

3

Being informed helps in staying secure

4

Vigilance is not related to security

28

Poll

How confident do you feel about this topic now?

Very confident
Somewhat confident
Not confident
media

Show answer

Auto Play

Slide 1 / 28

SLIDE