Computer Security & Malware Quiz Review

Computer Security & Malware Quiz Review

9th - 12th Grade

23 Qs

quiz-placeholder

Similar activities

Lab Safety Test: Cyber Foundations2 _Coach Aaron

Lab Safety Test: Cyber Foundations2 _Coach Aaron

6th - 12th Grade

22 Qs

Revisão - Administração de Redes

Revisão - Administração de Redes

1st - 12th Grade

20 Qs

EmpTech: ICT Intro Long Quiz

EmpTech: ICT Intro Long Quiz

11th Grade

25 Qs

Join

Join

10th - 11th Grade

23 Qs

First Summative Test in E-Tech

First Summative Test in E-Tech

12th Grade

20 Qs

Information Security - Year 7

Information Security - Year 7

7th - 9th Grade

27 Qs

Seguridad en Internet Paula 2ºBach

Seguridad en Internet Paula 2ºBach

12th Grade

21 Qs

IT NATIONALS 1/2 QUIZ

IT NATIONALS 1/2 QUIZ

10th Grade

25 Qs

Computer Security & Malware Quiz Review

Computer Security & Malware Quiz Review

Assessment

Quiz

Instructional Technology

9th - 12th Grade

Medium

Created by

Sean Stewart

Used 59+ times

FREE Resource

23 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of malware that will provide you with targeted ads and online content, including pop-ups.

Spyware

Ransomware

Adware

Malware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of software that monitors and records your keyboard keystrokes and mouse movements.

Zombie

Keylogger

Spyware

Scareware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A type of software that includes all malicious applications that can run on your computer.

DDoS

Logic Bomb

Rootkit

Malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When many computers are used to attack a website in order to delay access to or crash the site itself.

Worm

DDoS

Cookie

Z-bots

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware will initiate its attack only when a certain condition is met, possibly a time or status change.

Phishing

Virus

Logic Bomb

Zombie

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

These spread through a network's vulnerabilities without any human interaction and damage through replication

Worm

Trojan

Ransomware

Spoofing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

E-mails pretending to be from legitimate businesses in order to get individuals to provide personal data, such as passwords.

Phishing

Spoofing

Virus

Keylogger

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?