Computer Security & Malware Quiz Review

Computer Security & Malware Quiz Review

9th - 12th Grade

23 Qs

quiz-placeholder

Similar activities

GAD Unit 2 Quiz 1

GAD Unit 2 Quiz 1

9th - 12th Grade

20 Qs

Pa Emission Study Guide

Pa Emission Study Guide

12th Grade - University

20 Qs

Photoshop Certification [2, Panels]

Photoshop Certification [2, Panels]

9th - 12th Grade

20 Qs

ULANGAN HARIAN I

ULANGAN HARIAN I

9th Grade

20 Qs

LINK TEST - KHỞI ĐỘNG

LINK TEST - KHỞI ĐỘNG

6th - 12th Grade

20 Qs

CPA MS-Office Hotkeys Quiz

CPA MS-Office Hotkeys Quiz

8th Grade - Professional Development

21 Qs

Syllabus Quiz

Syllabus Quiz

9th - 12th Grade

20 Qs

Soal UTS Ganjil

Soal UTS Ganjil

11th Grade

20 Qs

Computer Security & Malware Quiz Review

Computer Security & Malware Quiz Review

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Practice Problem

Medium

Created by

Sean Stewart

Used 61+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware that will provide you with targeted ads and online content, including pop-ups.

Spyware

Ransomware

Adware

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of software that monitors and records your keyboard keystrokes and mouse movements.

Zombie

Keylogger

Spyware

Scareware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of software that includes all malicious applications that can run on your computer.

DDoS

Logic Bomb

Rootkit

Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When many computers are used to attack a website in order to delay access to or crash the site itself.

Worm

DDoS

Cookie

Z-bots

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware will initiate its attack only when a certain condition is met, possibly a time or status change.

Phishing

Virus

Logic Bomb

Zombie

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These spread through a network's vulnerabilities without any human interaction and damage through replication

Worm

Trojan

Ransomware

Spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

E-mails pretending to be from legitimate businesses in order to get individuals to provide personal data, such as passwords.

Phishing

Spoofing

Virus

Keylogger

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Instructional Technology