G11 Malware - Protection

G11 Malware - Protection

12th Grade

15 Qs

quiz-placeholder

Similar activities

Cyber Security

Cyber Security

9th - 12th Grade

18 Qs

G11&&12_Quiz1_2024_Cybersecurity

G11&&12_Quiz1_2024_Cybersecurity

12th Grade

20 Qs

Cybersecurity Lesson 4 - Malware Quiz

Cybersecurity Lesson 4 - Malware Quiz

12th Grade

14 Qs

Detecting and Preventing Cyber Security Threats

Detecting and Preventing Cyber Security Threats

9th - 12th Grade

12 Qs

Digital Media - Chapter 1

Digital Media - Chapter 1

9th - 12th Grade

20 Qs

Introduction to Malware

Introduction to Malware

12th Grade

16 Qs

Computer Malware

Computer Malware

6th - 12th Grade

10 Qs

Malware

Malware

9th - 12th Grade

19 Qs

G11 Malware - Protection

G11 Malware - Protection

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Fritz Bansag

Used 13+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network of infected computers used to distribute malware is known as?

Robot

Botnet

Internet

Intranet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following options is not a common option when anti-virus software detects an infected file?

Quarantine

Delete

Open

Clean

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

____ is created and distributed for malicious purposes

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is created and distributed for malicious purposes

Firewall

Tupperware

Malware

Hardware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This virus is so called because it is disguised as a file that a suer would be particularly tempted to open. e.g. game or a graphics file.

Trojan Horse

Spyware

Worms

DDoS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is a type of virus that replicates itself within a system so many times that it simply clogs up the system resources.

Trojan Horse

Spyware

Worms

DDoS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This keep track of web pages that you look at and then sends the data to a third party.

Trojan Horse

Spyware

Worms

DDoS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?