
Y9 System security
Authored by Mr Bell
Computers
5th Grade
Used 40+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
A program that installs and runs on a computer without the user’s knowledge.
Hardware that controls a user’s computer without their knowledge.
A faulty piece of software.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a virus?
A program that is used to keep your computer healthy.
A program that replicates itself and spreads to other computers via attachments.
A program that you can download for free.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is spyware?
A program that replicates itself and spreads to other computers via attachments.
Hardware that controls a computer without the user's knowledge.
A program that monitors computer activity in an attempt to steal sensitive information.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is ransomware?
It locks your files and you receive a message asking for payment to release them.
It tells the user their computer is infected with a virus to scare them into downloading malware.
It changes permissions on the computer giving hackers administration rights.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is scareware?
It locks your files and you receive a message asking for payment to release them.
It tells the user their computer is infected with a virus to scare them into downloading malware.
It changes permissions on the computer giving hackers administration rights.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a rootkit?
It locks your files and you receive a message asking for payment to release them.
It tells the user their computer is infected with a virus to scare them into downloading malware.
It changes permissions on the computer giving hackers administration rights.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these best describes social engineering?
An employee hacks into a computer in their workplace to steal sensitive data.
An employee installs a virus on a work computer.
An employee receives a fake email, phone call or message that tricks them into giving sensitive data away.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?