Malware Part 2

Malware Part 2

6th Grade

12 Qs

quiz-placeholder

Similar activities

Excel

Excel

5th - 6th Grade

15 Qs

Python List

Python List

4th Grade - University

15 Qs

Quiz 1

Quiz 1

1st - 12th Grade

15 Qs

ICT at Pittville

ICT at Pittville

6th - 8th Grade

10 Qs

PHẦN CỨNG 2 ( LỚP 3.2)

PHẦN CỨNG 2 ( LỚP 3.2)

1st Grade - University

10 Qs

Encryption and Public Keys

Encryption and Public Keys

6th - 8th Grade

8 Qs

Spanish constitution

Spanish constitution

6th Grade

12 Qs

Guess The Youtuber

Guess The Youtuber

5th - 8th Grade

10 Qs

Malware Part 2

Malware Part 2

Assessment

Quiz

Computers

6th Grade

Medium

Created by

Denise Reichard

Used 48+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You received an e-mail message from someone you don't know.


The e-mail requests you to click a link and provide some information.


It says that in exchange, you will receive access to a site that offers incredible deals on popular items, up to 90 percent off retail cost.


This offer sounds too good to be true. What type of security threat have you encountered?

Pharming

Trojan

Virus

Phishing

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A website you are visiting has a flashing advertisement in the sidebar, telling you that viruses have been detected, and you need to "clean" your computer.


You click on the advertisement, a few more popups appear, which you click through.


They tell you the computer is now clean.


However, in the next few days, you notice your computer is behaving strangely.


A careful review indicates several new programs have been installed, without your knowledge.


What kind of security problem has occurred?

Spyware has modified your browser to show you more popups

A worm has replicated several different programs

A virus allowed a hacker access to your computer

A Trojan installed unwanted programs

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following best describes strong password practices?

Ideal password length should be 4 to 6 characters.

Passwords should contain no punctuation or symbols.

You can use the same "all-purpose" password on multiple sites if they do not contain your private information.

Passwords should contain no personal identifying information such as a birthdate or pet name.

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A pop up appears the first time you are visiting a game Web site.


It states that you are the 100,000th unique visitor to the site and have won the latest gaming console.


It asks for your name, age and address, as well as a few other pieces of personal information, so that it can mail you the prize.


What should you do?

Do not input any information, close the pop up and leave the Web site.

Make sure that you have the latest anti-virus software installed and then proceed with filling out the information.

Ask your friends if they have ever received the same pop-up from the game site and how they responded.

Fill out the information, but be careful not to include financial information.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Gwen has a hard time remembering her passwords.


Her best friend recommends that she try her technique.


She uses her first name followed by the digits for her address, such as gwen5336.


Is this good advice?

No, passwords should not contain personal identifying information such as names, birthdates or addresses.

No, ideal password length should be 4 to 6 characters.

Yes, the password is strong because it has letters and numbers.

Yes, passwords should be easy to remember.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Why is it the most important reason to be careful when choosing the apps that you will install on your mobile phone, or any other computing device?

Because some apps have limited trial periods and then you must pay for them

Because some apps are free

Because some apps cost more than they should

Because some apps are designed to steal your personal information

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Herman tells you that his computer has suddenly started to display random messages on screen.


It has also stopped responding to keyboard and mouse input.


Which of the following do you suspect has occurred?

The computer has been infected by adware.

The computer has been infected by spyware.

The computer has been infected with phishing.

The computer has been infected with a virus.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?