Virus & Malwares

Virus & Malwares

6th Grade

11 Qs

quiz-placeholder

Similar activities

TECNOLOGÍA E INFORMÁTICA

TECNOLOGÍA E INFORMÁTICA

6th - 11th Grade

10 Qs

tecnologias

tecnologias

1st - 10th Grade

10 Qs

Bài 5: Bảo vệ thông tin máy tính

Bài 5: Bảo vệ thông tin máy tính

6th - 9th Grade

10 Qs

Computer Viruses

Computer Viruses

6th - 10th Grade

10 Qs

Përdorimi i sigurt i internetit. Platforma eTwinning

Përdorimi i sigurt i internetit. Platforma eTwinning

5th - 12th Grade

15 Qs

Quiz - Current Affairs

Quiz - Current Affairs

6th - 12th Grade

12 Qs

Virus

Virus

5th - 6th Grade

15 Qs

Cybersecurity, Victor Magnusson

Cybersecurity, Victor Magnusson

1st Grade - Professional Development

10 Qs

Virus & Malwares

Virus & Malwares

Assessment

Quiz

Instructional Technology

6th Grade

Hard

Created by

Jega K

Used 41+ times

FREE Resource

11 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which TWO statements define malware most accurately? (Select 2 answers)

Malware is a form of virus.

Trojans are malware.

Malware covers all malicious software

Malware only covers spyware

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Which are TWO characteristics of a virus?

A virus is malware.

A virus replicates on its own.

A virus replicates with user interaction.

A virus is an item that runs silently.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus does not do which of the following?

Replicates with user interaction

Changes configuration settings

Exploits vulnerabilities

Displays pop-ups

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Which TWO statements are true of a worm?

A worm is malware.

A worm replicates on its own.

A worm replicates with user interaction.

A worm is an item that runs silently.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What are worms typically known for?

Rapid replication

Configuration changes

Identity theft

DDoS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Trojan relies on _______ to be activated.

Vulnerability

Social engineering

Port redirection

Human beings

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A logic bomb is activated by the following EXCEPT

Time and date

Actions

Event

Date and vulnerability

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?