G11 Malware - Protection

G11 Malware - Protection

12th Grade

15 Qs

quiz-placeholder

Similar activities

CyberSecurity Basics

CyberSecurity Basics

6th - 12th Grade

10 Qs

Coding Quiz 1 - Term 2

Coding Quiz 1 - Term 2

9th Grade - University

12 Qs

bài máy tính cơ bản

bài máy tính cơ bản

1st Grade - University

20 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

AHLI KOMPUTER - PENGAKAP

AHLI KOMPUTER - PENGAKAP

1st - 12th Grade

20 Qs

Sumatif 1 Dampak Sosial Informatika

Sumatif 1 Dampak Sosial Informatika

9th Grade - University

15 Qs

Empowerment

Empowerment

12th Grade

13 Qs

Computer Security Risk

Computer Security Risk

11th Grade - University

16 Qs

G11 Malware - Protection

G11 Malware - Protection

Assessment

Quiz

Computers

12th Grade

Medium

Created by

Fritz Bansag

Used 13+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network of infected computers used to distribute malware is known as?

Robot

Botnet

Internet

Intranet

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following options is not a common option when anti-virus software detects an infected file?

Quarantine

Delete

Open

Clean

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

____ is created and distributed for malicious purposes

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is created and distributed for malicious purposes

Firewall

Tupperware

Malware

Hardware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This virus is so called because it is disguised as a file that a suer would be particularly tempted to open. e.g. game or a graphics file.

Trojan Horse

Spyware

Worms

DDoS

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This is a type of virus that replicates itself within a system so many times that it simply clogs up the system resources.

Trojan Horse

Spyware

Worms

DDoS

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This keep track of web pages that you look at and then sends the data to a third party.

Trojan Horse

Spyware

Worms

DDoS

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?