IT Security Vulnerabilities Quiz

IT Security Vulnerabilities Quiz

University

10 Qs

quiz-placeholder

Similar activities

ias615: Group 1 : Computer Attack (Part 1)

ias615: Group 1 : Computer Attack (Part 1)

University

10 Qs

IC3 GS6 Level 1 Domain 2 Lesson 1

IC3 GS6 Level 1 Domain 2 Lesson 1

6th Grade - University

15 Qs

Malware Quiz

Malware Quiz

KG - University

15 Qs

Network Basic

Network Basic

University

10 Qs

Computer Science :- Malware , HTML , Search Engine..!

Computer Science :- Malware , HTML , Search Engine..!

9th Grade - University

15 Qs

Software

Software

University

15 Qs

تحدي المخترقين 2.0

تحدي المخترقين 2.0

University

15 Qs

Data Breach Quiz

Data Breach Quiz

University

12 Qs

IT Security Vulnerabilities Quiz

IT Security Vulnerabilities Quiz

Assessment

Quiz

Computers

University

Hard

Created by

undefined Khairiny

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a computer virus?

A software program that attaches itself to other software programs or data files to be executed

A type of malware that spreads from computer to computer over a network

A software program that appears to be benign but then does something other than expected

Malware that tries to extort money from users by taking control of their computers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a worm?

A software program that attaches itself to other software programs or data files to be executed

A type of malware that spreads from computer to computer over a network

A software program that appears to be benign but then does something other than expected

Malware that tries to extort money from users by taking control of their computers

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Trojan horse?

A software program that attaches itself to other software programs or data files to be executed

A type of malware that spreads from computer to computer over a network

A software program that appears to be benign but then does something other than expected

Malware that tries to extort money from users by taking control of their computers

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ransomware?

A software program that attaches itself to other software programs or data files to be executed

A type of malware that spreads from computer to computer over a network

A software program that appears to be benign but then does something other than expected

Malware that tries to extort money from users by taking control of their computers

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is spyware?

A software program that attaches itself to other software programs or data files to be executed

A type of malware that spreads from computer to computer over a network

A software program that appears to be benign but then does something other than expected

Malware that tries to extort money from users by taking control of their computers

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of hackers?

To gain unauthorized access to a computer system

To spread malware to other computers

To serve up advertising to users

To disrupt or destroy websites or corporate information systems

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is system intrusion?

Gaining unauthorized access to a computer system

Spreading malware to other computers

Serving up advertising to users

Disrupting or destroying websites or corporate information systems

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?