Understanding Malware

Understanding Malware

11th Grade

15 Qs

quiz-placeholder

Similar activities

30 Days of Photoshop Day 01

30 Days of Photoshop Day 01

6th - 12th Grade

12 Qs

Editing Images and Text LAB review

Editing Images and Text LAB review

11th Grade

20 Qs

Uji Pengetahuan Sistem Komputer

Uji Pengetahuan Sistem Komputer

11th Grade

20 Qs

ACA Digital D2L2

ACA Digital D2L2

9th - 12th Grade

14 Qs

Digital Citizenship

Digital Citizenship

5th - 12th Grade

15 Qs

Basic Tools Quiz

Basic Tools Quiz

6th - 12th Grade

20 Qs

Networking

Networking

9th - 12th Grade

15 Qs

GM Session 1 Post Test

GM Session 1 Post Test

9th - 12th Grade

19 Qs

Understanding Malware

Understanding Malware

Assessment

Interactive Video

Design

11th Grade

Hard

Created by

David Smedley

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of a Trojan horse?

To display advertisements

To spy on users or install spyware

To clean the computer from viruses

To encrypt files for ransom

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a keylogger do?

Removes malware

Encrypts files

Records every keystroke made on a keyboard

Displays pop-up ads

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why did Mark Zuckerberg tape over his webcam and microphone?

To avoid distractions

To prevent physical damage

To protect against spyware

To improve sound quality

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is adware primarily designed to do?

Remove viruses

Record keystrokes

Display advertisements

Encrypt files

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can adware become a type of spyware?

By slowing down the computer

By removing other malware

By collecting data about the user

By displaying too many ads

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main goal of ransomware?

To demand money for file decryption

To display ads

To clean the computer

To record keystrokes

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What method do ransomware attackers often use to make their demands untraceable?

Credit Card

Cryptocurrency

Bank Transfer

PayPal

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?