What type of malware can copy itself and spread itself without human interaction.
Network Security

Quiz
•
Computers
•
9th Grade
•
Medium
Dave Gwilt
Used 343+ times
FREE Resource
13 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can appear harmless but is in fact malicious and can install a backdoor into your system?
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can encrypt your files and then require a payment to decrypt them.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can copy itself and typically corrupts or deletes files. It is usually triggered by running an infected program.
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware can record the keys that you type at the keyboard and sends them to a 3rd party?
Virus
Trojan
Worm
Ransomware
Spyware (Key Logger)
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is the best definition of Phishing?
Calling someone to create an invented situation that increases the chance they will share sensitive information with you.
Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.
A cyber attack that redirects a user from a real URL to a website that looks real but is not.
Looking at someone entering their personal data into a system and copying what you see.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of these is the best definition of Pharming?
Calling someone to create an invented situation that increases the chance they will share sensitive information with you.
Sending an email that pretends to be from a reputable company which usually has a link to click that takes you to a website that looks real but is not.
A cyber attack that redirects a user from a real URL to a website that looks real but is not.
Looking at someone entering their personal data into a system and copying what you see.
Create a free account and access millions of resources
Similar Resources on Quizizz
15 questions
Malware

Quiz
•
7th - 11th Grade
15 questions
Malware

Quiz
•
9th - 11th Grade
12 questions
CamTech Network Security

Quiz
•
8th - 12th Grade
18 questions
Cybersecurity Vocabulary 2022

Quiz
•
9th - 12th Grade
15 questions
network security

Quiz
•
9th Grade
18 questions
Cyber Security

Quiz
•
9th - 12th Grade
11 questions
Threats to Data

Quiz
•
9th - 12th Grade
14 questions
Types of Malware

Quiz
•
6th - 9th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University