Virus & Malwares

Virus & Malwares

6th Grade

11 Qs

quiz-placeholder

Similar activities

INFORMÁTICA

INFORMÁTICA

1st Grade - University

10 Qs

Diagnóstico Apropiación Tecnológica

Diagnóstico Apropiación Tecnológica

1st Grade - Professional Development

15 Qs

Website Evaluation

Website Evaluation

3rd - 6th Grade

10 Qs

B.O.Y. Video Assignment Quiz

B.O.Y. Video Assignment Quiz

6th - 8th Grade

15 Qs

Làm quen với Tin học 6

Làm quen với Tin học 6

6th Grade

15 Qs

Scruffiti Lesson 2

Scruffiti Lesson 2

6th - 8th Grade

10 Qs

Programs and Variables in Code and Play

Programs and Variables in Code and Play

5th - 9th Grade

7 Qs

"Don't fall for the Fake" - Lesson 2

"Don't fall for the Fake" - Lesson 2

6th Grade

13 Qs

Virus & Malwares

Virus & Malwares

Assessment

Quiz

Instructional Technology

6th Grade

Hard

Created by

Jega K

Used 41+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which TWO statements define malware most accurately? (Select 2 answers)

Malware is a form of virus.

Trojans are malware.

Malware covers all malicious software

Malware only covers spyware

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Which are TWO characteristics of a virus?

A virus is malware.

A virus replicates on its own.

A virus replicates with user interaction.

A virus is an item that runs silently.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus does not do which of the following?

Replicates with user interaction

Changes configuration settings

Exploits vulnerabilities

Displays pop-ups

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Which TWO statements are true of a worm?

A worm is malware.

A worm replicates on its own.

A worm replicates with user interaction.

A worm is an item that runs silently.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What are worms typically known for?

Rapid replication

Configuration changes

Identity theft

DDoS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Trojan relies on _______ to be activated.

Vulnerability

Social engineering

Port redirection

Human beings

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A logic bomb is activated by the following EXCEPT

Time and date

Actions

Event

Date and vulnerability

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?