Computer Security & Malware Quiz Review

Computer Security & Malware Quiz Review

9th - 12th Grade

23 Qs

quiz-placeholder

Similar activities

Woodwork Tools

Woodwork Tools

6th - 9th Grade

20 Qs

Quiz Hotel - FIA

Quiz Hotel - FIA

1st - 12th Grade

23 Qs

Week 3 - Canva

Week 3 - Canva

12th Grade

20 Qs

Recap Materials.

Recap Materials.

10th Grade

20 Qs

Haircutting

Haircutting

11th Grade

21 Qs

Peligros en Internet para Niños

Peligros en Internet para Niños

12th Grade - University

20 Qs

EMTECH Q2 M6 PUBLISHING AN ICT PROJECT

EMTECH Q2 M6 PUBLISHING AN ICT PROJECT

11th Grade

20 Qs

instructional technology

instructional technology

KG - Professional Development

20 Qs

Computer Security & Malware Quiz Review

Computer Security & Malware Quiz Review

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Practice Problem

Medium

Created by

Sean Stewart

Used 60+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware that will provide you with targeted ads and online content, including pop-ups.

Spyware

Ransomware

Adware

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of software that monitors and records your keyboard keystrokes and mouse movements.

Zombie

Keylogger

Spyware

Scareware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of software that includes all malicious applications that can run on your computer.

DDoS

Logic Bomb

Rootkit

Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When many computers are used to attack a website in order to delay access to or crash the site itself.

Worm

DDoS

Cookie

Z-bots

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware will initiate its attack only when a certain condition is met, possibly a time or status change.

Phishing

Virus

Logic Bomb

Zombie

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These spread through a network's vulnerabilities without any human interaction and damage through replication

Worm

Trojan

Ransomware

Spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

E-mails pretending to be from legitimate businesses in order to get individuals to provide personal data, such as passwords.

Phishing

Spoofing

Virus

Keylogger

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?