Malware - BP

Malware - BP

7th Grade

10 Qs

quiz-placeholder

Similar activities

Online Security Threats

Online Security Threats

7th - 11th Grade

8 Qs

Internet: Communicating online

Internet: Communicating online

5th - 8th Grade

12 Qs

Software - Common Utility Programs

Software - Common Utility Programs

3rd - 12th Grade

10 Qs

Cyber Security - Year 9

Cyber Security - Year 9

1st - 9th Grade

12 Qs

E-safety

E-safety

6th - 12th Grade

10 Qs

Online Safety

Online Safety

KG - 9th Grade

9 Qs

Ethics and Safety measures in Computing - Computer Quiz.

Ethics and Safety measures in Computing - Computer Quiz.

7th Grade

10 Qs

J277 Network Threats

J277 Network Threats

7th - 11th Grade

10 Qs

Malware - BP

Malware - BP

Assessment

Quiz

Computers

7th Grade

Hard

Created by

Caston Jackson

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How is a computer virus like the flu virus?

It has a yearly season

Everyone gets infected by one eventually

It spreads within a host

It requires treatment by a professional

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most likely reason for an antivirus software update?

A worm has gotten into the antivirus network

A scam text message appears on your phone

A suspicious email arrives in your inbox

A new spyware worm is going around

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is true of any malware?

It is a damaging program

It is a kind of virus

It will expose your most private files

You have to download it

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Trojan horses typically infect a device through:

Photos on social media

Text messages

Online chats

Downloads or attachments

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How are worms different from Trojan horses?

Worms enter a device via an email attachment

Worms can spread on their own

Worms hide from the user

Worms delete files

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the best way to protect a smart phone from worms?

Don't connect it to an unknown wireless network

Don't answer calls from unknown numbers

Don't install any apps

Don't use it to browse the Internet

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a payload?

A suspicious file attachment

A wireless network of home appliances

A keyboard recording program

An expensive antivirus software

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?