Computer Security & Malware Quiz Review

Computer Security & Malware Quiz Review

9th - 12th Grade

23 Qs

quiz-placeholder

Similar activities

Algorithms

Algorithms

6th - 9th Grade

18 Qs

GIMP

GIMP

9th Grade

20 Qs

Overview of computer

Overview of computer

10th - 11th Grade

20 Qs

GLOSARIO DE TERMINOS

GLOSARIO DE TERMINOS

7th - 11th Grade

20 Qs

Ulangan Harian

Ulangan Harian

KG - 11th Grade

20 Qs

Storyboard Overall Review Part 1

Storyboard Overall Review Part 1

9th - 12th Grade

20 Qs

Sfida informatica

Sfida informatica

6th - 10th Grade

20 Qs

Arrays

Arrays

9th - 12th Grade

21 Qs

Computer Security & Malware Quiz Review

Computer Security & Malware Quiz Review

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Practice Problem

Medium

Created by

Sean Stewart

Used 61+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware that will provide you with targeted ads and online content, including pop-ups.

Spyware

Ransomware

Adware

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of software that monitors and records your keyboard keystrokes and mouse movements.

Zombie

Keylogger

Spyware

Scareware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of software that includes all malicious applications that can run on your computer.

DDoS

Logic Bomb

Rootkit

Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When many computers are used to attack a website in order to delay access to or crash the site itself.

Worm

DDoS

Cookie

Z-bots

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware will initiate its attack only when a certain condition is met, possibly a time or status change.

Phishing

Virus

Logic Bomb

Zombie

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These spread through a network's vulnerabilities without any human interaction and damage through replication

Worm

Trojan

Ransomware

Spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

E-mails pretending to be from legitimate businesses in order to get individuals to provide personal data, such as passwords.

Phishing

Spoofing

Virus

Keylogger

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology