
year10
Quiz
•
Computers
•
5th - 12th Grade
•
Practice Problem
•
Hard
Ahmed A Mohamed
Used 1+ times
FREE Resource
Enhance your content in a minute
9 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For each of the scenarios given below, pick which hacking techniques have been used.
Tyler goes to a website that says that it will supply cracked software that doesn’t need a licence. After installing the software, the user is pleased as it works as expected. They notice later that many adverts display on their computer.
Virus
Worm
Trojan
Ransomware
Key logger
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For each of the scenarios given below, pick which hacking techniques have been used.
Leila clicked on a file in an email attachment. Today when she turned on her computer, it said that all her files are now encrypted. She has been given 24 hours to pay one bitcoin to unencrypt the files.
Virus
Worm
Trojan
Ransomware
Key logger
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For each of the scenarios given below, pick which hacking techniques have been used.
Richard has downloaded a file from the Internet and run it. After a short while he has noticed that many of the files on his computer have been deleted or corrupted.
Virus
Worm
Trojan
Ransomware
Key logger
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For each of the scenarios given below, pick which hacking techniques have been used.
An item of malware has installed itself to a computer. It is secretly recording each character that is pressed by the user and sending it to a hacker.
Virus
Worm
Trojan
Ransomware
Key logger
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For each of the scenarios given below, pick which hacking techniques have been used.
A program has been written that targets computers on the Internet. It automatically replicates itself, and whilst it doesn’t harm any individual computers, it does slow down the network.
Virus
Worm
Trojan
Ransomware
Key logger
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What are the two words used to make the word malware?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Where do Computer Trojans orginate from?
Greece
France
Germany
America
UK
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
CyperSecurity
Quiz
•
10th Grade
14 questions
6to Informática Imple Mant Apli Sist Inf
Quiz
•
12th Grade
14 questions
Threat Prevention
Quiz
•
11th Grade
10 questions
Information Systems 2
Quiz
•
11th Grade - University
10 questions
ICT Grade 7 Revision
Quiz
•
7th Grade
10 questions
IGCSE Comp Sci - Security revision
Quiz
•
9th - 11th Grade
10 questions
Cyber Threat
Quiz
•
8th Grade
10 questions
computer virus
Quiz
•
5th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
