
Safety and Security
Authored by Aubrey R
Computers, Education
8th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one matches the description Trojan?
Malicious software that misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it.
Trojan
A broad term that refers to a variety of malicious programs, such as adware, bots, bugs, rootkits, spyware, Trojan horses, viruses, and worms.
Malware
Is installed on a computer without the knowledge of the owner in order to collect the owner's private information.
Spyware
An attempt to deceive someone into sharing sensitive information like passwords and credit card numbers.
Phishing
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the most secure password?
1234ABCD
pa$$w0rd
Love-U
8675309
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best description of Malware?
Is installed on a computer without the knowledge of the owner in order to collect the owner's private information.
A broad term that refers to a variety of malicious programs, such as adware, bots, bugs, rootkits, spyware, Trojan horses, viruses, and worms.
An attempt to deceive someone into sharing sensitive information like passwords and credit card numbers.
Phishing
A malicious computer program self-replicates by copying itself to another program.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best description of Spyware?
Locks your computer until a sum of money is paid.
Is installed on a computer without the knowledge of the owner in order to collect the owner's private information.
An attempt to deceive someone into sharing sensitive information like passwords and credit card numbers.
Malicious software that misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best description of Ransomeware?
Locks your computer until a sum of money is paid.
An attempt to deceive someone into sharing sensitive information like passwords and credit card numbers.
Is installed on a computer without the knowledge of the owner in order to collect the owner's private information
A broad term that refers to a variety of malicious programs, such as adware, bots, bugs, rootkits, spyware, Trojan horses, viruses, and worms.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best description of the term "virus"?
An attempt to deceive someone into sharing sensitive information like passwords and credit card numbers.
Phishing
Locks your computer until a sum of money is paid.
A broad term that refers to a variety of malicious programs, such as adware, bots, bugs, rootkits, spyware, Trojan horses, viruses, and worms.
None of these
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the best description for phishing?
Is installed on a computer without the knowledge of the owner in order to collect the owner's private information.
An attempt to deceive someone into sharing sensitive information like passwords and credit card numbers.
Is installed on a computer without the knowledge of the owner in order to collect the owner's private information.
Malicious software that misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?