
Post-test in Online Safety, Security, Ethics and Etiquette
Authored by Lorelie Panulin
Other
University
Used 15+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
1. It is a stand-alone malicious software that can self replicate and propagate via computer networks w/o human help.
Virus
Worm
Trojan
Spyware
2.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
2. It is loaded onto a user's computer without the user's knowledge and perform malicious actions and can be transferred from one computer to another
Virus
Worm
Trojan
Spyware
3.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
3. A program that runs in the background without you knowing it(thus called "spy") It has the ability to monitor what you are currently doing and typing through key logging.
Virus
Worm
Trojan
Spyware
4.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
4. It disguised as a useful program but once downloaded or installed, leaves your PC unprotected and allows hackers to get your information.
Virus
Worm
Trojan
Spyware
5.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
5. It is used to record the keystroke done by the users. This is done to steal their password or any other sensitive information.
Virus
Trojan
Keyloggers
Spyware
6.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
6. It's goal is to acquire sensitive personal information like passwords and credit card details.
Trojan
Spyware
Adware
Phishing
7.
MULTIPLE CHOICE QUESTION
20 sec • 1 pt
7. Unwanted email mostly from bots or advertisers. It can be used to send malware.
Adware
Spyware
Spam
Keyloggers
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?