IT Security

IT Security

Professional Development

8 Qs

quiz-placeholder

Similar activities

Identifying Malware

Identifying Malware

Professional Development

10 Qs

Closing Quiz (Peretas)

Closing Quiz (Peretas)

Professional Development

10 Qs

Type of Attack Indicators

Type of Attack Indicators

Professional Development

10 Qs

IT security and safety

IT security and safety

Professional Development

10 Qs

Computer Security Basics

Computer Security Basics

Professional Development

10 Qs

Security I - Day 3 - Review of Day 2

Security I - Day 3 - Review of Day 2

Professional Development

12 Qs

Cyber Security 18

Cyber Security 18

Professional Development

10 Qs

Cybersecurity

Cybersecurity

Professional Development

10 Qs

IT Security

IT Security

Assessment

Quiz

English, Computers

Professional Development

Medium

Created by

F-X Priour

Used 38+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software that can copy itself and infect the system

virus

Trojan

spyware

hacker

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program which is usually free but contains malicious files

hacker

worm

Trojan

malware attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program that does not take control of the computer, but affects privacy by sending information about you use it.

malware attack

spyware

browser hijacker

worm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program that automatically plays advertisements on a computer

adware

virus

spyware

worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An effort to gain unauthorized access to a computer

Trojan

malware attack

browser hijacker

hacker

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A program that spreads without the user taking any action and usually acts in the operation system

virus

Trojan

worm

adware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Software that replaces the user's default search engine with its own

adware

malware attack

hacker

browser hijacker

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A person who attempts to break into a computer system

browser hijacker

hacker

worm

Trojan