BTEC IT Unit 1 D: Malware and Other Attacks

BTEC IT Unit 1 D: Malware and Other Attacks

11th - 12th Grade

20 Qs

quiz-placeholder

Similar activities

Animated Canvas

Animated Canvas

9th - 12th Grade

19 Qs

Coding Karel 2

Coding Karel 2

KG - University

20 Qs

Computer Hardware - CPU & GPU

Computer Hardware - CPU & GPU

7th Grade - University

16 Qs

FormazioneSicurezzaSpecifica_Mod. 3.1

FormazioneSicurezzaSpecifica_Mod. 3.1

9th - 12th Grade

17 Qs

Skill Competition Quiz 2024

Skill Competition Quiz 2024

10th Grade - University

20 Qs

Common Protocols

Common Protocols

10th - 12th Grade

15 Qs

Topic 4.1 Introduction to Java

Topic 4.1 Introduction to Java

12th Grade

20 Qs

CSS - Operating System

CSS - Operating System

11th Grade

20 Qs

BTEC IT Unit 1 D: Malware and Other Attacks

BTEC IT Unit 1 D: Malware and Other Attacks

Assessment

Quiz

Computers

11th - 12th Grade

Practice Problem

Medium

CCSS
L.11-12.6, RI.11-12.7, L.9-10.6

+7

Standards-aligned

Created by

Simon Graham

Used 80+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

1 min • 1 pt

Select ALL the malware

Worm

Trojan Horse

WAN

Virus

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A computer ****** is one type of malware (malicious software) which is installed without your knowledge, with the purpose of doing harm . A ******** is a program which infects (embeds itself in) other programs or data files. It is easily spread if a user innocently sends an infected file to someone else

Virus

Trojan Horse

WAN

Worm

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

•A ******* is a type of malware

•It is a standalone program that does need to attach itself to an existing program in order to spread

Virus

Trojan Horse

WAN

Worm

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

•may open a “back door” into your computer system through which your personal information can be harvested.

•It can also use your computer power and network bandwidth to send thousands of spam emails to others.

Virus

Trojan Horse

WAN

Worm

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Spyware is software that gathers information about a person or organisation without their knowledge?

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

blocks access until money is paid
steals your money
when someone steals your computer
Malware that multiplies

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is a trojan horse sneaky?

It is very inviting
It creeps into your computer
It attacks your computer while it seems like it completes a relevant task
Because of the romans

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?