Search Header Logo

Week 3 Review Pt 2

Authored by Ciara Williams

Computers

12th Grade

Used 1+ times

Week 3 Review Pt 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between a virus and a worm?

A virus spreads by infecting files, while a worm propagates in memory and over networks.

A worm spreads by infecting files, while a virus propagates in memory and over networks.

A virus uses document macros to spread, while a worm does not.

A worm uses document macros to spread, while a virus does not.

Answer explanation

A virus spreads by infecting files, while a worm propagates in memory and over networks.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of virus does not use document macros to spread?

Macro virus

Worm

Trojan

Spyware

Answer explanation

A worm is a type of virus that does not use document macros to spread. Unlike macro viruses, worms can replicate and spread independently without relying on user interaction.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware self-replicates in memory and over computer networks?

Virus

Worm

Ransomware

Trojan

Answer explanation

Worms are a type of malware that self-replicates in memory and over computer networks, making them the correct choice for this question.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can malware infect your computer through web browsing?

By exploiting a vulnerability in the software installed on your computer

By outdated hardware

By a properly configured firewall

By using a strong password

Answer explanation

By exploiting a vulnerability in the software installed on your computer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential consequence of an improperly configured firewall?

It may allow prohibited network traffic into or out of a network

It may cause hardware failure

It may slow down the computer

It may prevent software updates

Answer explanation

An improperly configured firewall may allow prohibited network traffic into or out of a network, leading to security vulnerabilities.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a human vulnerability that can be exploited by malicious people during social engineering?

Ability to be deceived or tricked

Outdated software

Weak passwords

Unused OS features

Answer explanation

The human vulnerability of being deceived or tricked can be exploited by malicious individuals during social engineering attacks.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does configuring data back-ups provide in the context of ransomware attacks?

Reduces the attack surface

Prevents malware infection

Provides a mechanism to recover from a ransomware attack

Increases computer speed

Answer explanation

Configuring data back-ups provides a mechanism to recover from a ransomware attack, allowing for restoration of encrypted files without paying the ransom.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers