Computer Security

Computer Security

University

16 Qs

quiz-placeholder

Similar activities

Identifica el tipo de ataque

Identifica el tipo de ataque

5th Grade - University

13 Qs

UIT 2221 MALWARE (COPTPA)

UIT 2221 MALWARE (COPTPA)

University

15 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

Cybersecurity

Cybersecurity

University

21 Qs

WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

10th Grade - University

19 Qs

 Chapter 9: Securing Your System: Protecting Your Digital Data a

Chapter 9: Securing Your System: Protecting Your Digital Data a

University

13 Qs

L7: Cybersecurity Threats Quiz

L7: Cybersecurity Threats Quiz

University

15 Qs

Computer Security

Computer Security

Assessment

Quiz

Computers

University

Medium

Created by

Fuhaina Ahmad

Used 8+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following requires a user to transport it from one computer to another?

Adware

Worm

Virus

Rootkit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware locks up a computer and gets release only when fee is paid?

Cryptomalware

Ransomware

Trojan

Adware

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

An example of is when a user download what is advertised as a calendar program, yet installing

the calendar also installs malware that scans the system for credit card numbers.

4.

OPEN ENDED QUESTION

3 mins • 1 pt

Media Image

Briefly explain the above virus infection method

Evaluate responses using AI:

OFF

5.

OPEN ENDED QUESTION

3 mins • 1 pt

How does computer firewall helps to limit the spread of malware? Give two examples

Evaluate responses using AI:

OFF

Answer explanation

it can block unwanted/suspicious traffic, it can filter traffic coming into and out of computer

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malware can circulate through email attachment that we click on

True

False

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Hide traces of activities either by deleting files or changing security setting to ignore malicious activity

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?