Virus & Malwares

Virus & Malwares

6th Grade

11 Qs

quiz-placeholder

Similar activities

Làm quen với Tin học 6

Làm quen với Tin học 6

6th Grade

15 Qs

Scruffiti Lesson 2

Scruffiti Lesson 2

6th - 8th Grade

10 Qs

Programs and Variables in Code and Play

Programs and Variables in Code and Play

5th - 9th Grade

7 Qs

HABILIDAES BLANDAS

HABILIDAES BLANDAS

6th Grade

10 Qs

Website Evaluation

Website Evaluation

3rd - 6th Grade

10 Qs

¿Qué sabemos sobre las Tics?

¿Qué sabemos sobre las Tics?

6th Grade

10 Qs

B.O.Y. Video Assignment Quiz

B.O.Y. Video Assignment Quiz

6th - 8th Grade

15 Qs

Scratch intro & Pen Commands Quiz

Scratch intro & Pen Commands Quiz

1st - 10th Grade

10 Qs

Virus & Malwares

Virus & Malwares

Assessment

Quiz

Instructional Technology

6th Grade

Practice Problem

Hard

Created by

Jega K

Used 41+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

11 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which TWO statements define malware most accurately? (Select 2 answers)

Malware is a form of virus.

Trojans are malware.

Malware covers all malicious software

Malware only covers spyware

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Which are TWO characteristics of a virus?

A virus is malware.

A virus replicates on its own.

A virus replicates with user interaction.

A virus is an item that runs silently.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus does not do which of the following?

Replicates with user interaction

Changes configuration settings

Exploits vulnerabilities

Displays pop-ups

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Media Image

Which TWO statements are true of a worm?

A worm is malware.

A worm replicates on its own.

A worm replicates with user interaction.

A worm is an item that runs silently.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What are worms typically known for?

Rapid replication

Configuration changes

Identity theft

DDoS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Trojan relies on _______ to be activated.

Vulnerability

Social engineering

Port redirection

Human beings

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A logic bomb is activated by the following EXCEPT

Time and date

Actions

Event

Date and vulnerability

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?