9J2 Revision Quiz

9J2 Revision Quiz

8th Grade

23 Qs

quiz-placeholder

Similar activities

Social Engineering and Malware

Social Engineering and Malware

8th - 11th Grade

25 Qs

ICT 8 - Safety and Security

ICT 8 - Safety and Security

6th - 9th Grade

22 Qs

1.4 - Network security

1.4 - Network security

7th - 10th Grade

25 Qs

Computer viruses

Computer viruses

5th - 8th Grade

18 Qs

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

Computer Crimes and Computer Ethics

Computer Crimes and Computer Ethics

6th - 10th Grade

21 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

Types of Cyberthreat

Types of Cyberthreat

8th Grade

20 Qs

9J2 Revision Quiz

9J2 Revision Quiz

Assessment

Quiz

Computers

8th Grade

Medium

Created by

Amanda Tomkins

Used 6+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

If a virus "Replicates" itself, what is it doing?

Copying itself

Deleting itself

Changing itself

Copying other data

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Standalone malware computer program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

Malicious Code

Computer Worm

Anti Virus Software

Computer Virus

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

type of malicious software program (malware) that, when executed, replicates by reproducing itself (copying its own source code) or infecting other computer programs by modifying them.

Computer Virus

Computer Worm

MyDoom

Malicious Code

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

what is the name of an application that appears to look like a helpful application but instead does harm to your computer?
virus
worm
malware
Trojan horse

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Rose just installed a new search engine on her laptop.now whenever she searches the internet, she gets several pop-up windows directing her to buy products.what does rose have?
ransomware
spyware
Adware
trojan horse

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image
What does 'DOS' attack stand for
Doom of System
Don't Open Service
Denial of Service
Didn't Order Security

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Hacking for a cause is called:
Active hacking
Hacktivism
Activism
Black-hat hacking

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?