
Yr 9.1.4 Cybersecurity: Rise of the Bots
Authored by Tim Bareham
Computers
8th Grade
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
5 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which of the following two are types of malware?
Trojan
Worm
Firewall
Anti-virus
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of a computer virus?
Malicious software that self-replicates
Malicious software that disguises itself as something else
Malicious software that uses network bandwidth to deliberately disrupt the speed of the network
Malicious software that monitors every keystroke the user makes
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements best describes a "worm"?
Self replicates and encrypts files to make them inaccessible
Self replicates, does not attach to files, but is designed to take up system resources to slow down the network or computer
Attaches to files and is designed to take up system resources to slow down the network or computer. Does not self replicate.
Malicious software that monitors every keystroke the user makes
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Wannacry virus was an example of which type of attack?
Spyware
DDoS
Brute force
Ransomware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following wouldn't an internet bot perform?
DDoS attack
Finding new websites for search engines to index
Brute force
Shouldering
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?