
J808 4.1 Types of threats
Authored by Jenny Sharp
Computers
9th - 11th Grade
Used 735+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
One method which will help prevent most malware
Click on links in emails
Install, run and keep updated a security software package
Open files from unknown sources
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which malware appears to be something wanted or needed by the user of a pc but in fact is hidden malware inside a valid program.
Spyware
Rootkit
Bot
Trojan horse
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which malware can remotely access a computer system without being detected by security software or the user
Bot
Rootkit
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which malware does not need another program and can replicate itself so it can spread to other computers?
Worm
Virus
Bot
Adware
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which type of malware generally infects files on a network and attempts to make a system unreliable?
Worm
Virus
Bot
Adware
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which type of malware holds restricts user access to a computer system until money is paid?
Spyware
Ransomware
Bug
Adware
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
Which type of malware takes control of a computer system and may contribute to a DDoS attack?
Bot
Bug
Spyware
Adware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?