
Creating a Secure System (5.8 - 5.11)
Authored by Teagan Graves
Computers
9th - 12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is ransomware?
A type of antivirus software
Malicious software that encrypts files and demands a ransom
A program that enhances computer performance
A hardware component of a computer
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
How does ransomware typically infect a computer?
By exploiting vulnerabilities in the computer's hardware
Through social engineering techniques, such as phishing emails
By physically damaging the computer's hard drive
Automatically through routine software updates
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the primary motivation behind a ransomware attack?
To gain unauthorized access to a computer system
To spread the ransomware to as many computers as possible
To encrypt files and demand a ransom from the victim
To gather information for identity theft
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Once ransomware has encrypted files, how is the victim typically instructed to pay the ransom?
In person, at a designated location
Using a cryptocurrency such as Bitcoin
Through a bank transfer
By mailing a check to the attacker's address
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the best practice for dealing with a ransomware attack?
Pay the ransom immediately to get the files back
Contact law enforcement and report the attack
Ignore the attack and hope it goes away
Disconnect the infected computer from the internet
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What can individuals and organizations do to prevent ransomware attacks?
Share passwords with colleagues
Disable antivirus software
Keep software and operating systems up to date
Click on email attachments from unknown sources
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What term is used to describe a backup of important files that can be used to restore data in case of a ransomware attack?
Redundant data
Recovery snapshot
Ransomware-proof copy
Offline backup
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?