Week 3 Review Pt 2

Week 3 Review Pt 2

12th Grade

30 Qs

quiz-placeholder

Similar activities

Digital Security Threats Quiz

Digital Security Threats Quiz

Malware Awareness Quiz

Malware Awareness Quiz

Malware Quiz

Malware Quiz

Malware

Malware

Viruses, Worms and Trojans

Viruses, Worms and Trojans

Cyber Security

Cyber Security

Understanding Malware

Understanding Malware

pltw malware and firewall

pltw malware and firewall

Week 3 Review Pt 2

Week 3 Review Pt 2

Assessment

Quiz

Computers

12th Grade

Practice Problem

Easy

Created by

Ciara Williams

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main difference between a virus and a worm?

A virus spreads by infecting files, while a worm propagates in memory and over networks.

A worm spreads by infecting files, while a virus propagates in memory and over networks.

A virus uses document macros to spread, while a worm does not.

A worm uses document macros to spread, while a virus does not.

Answer explanation

A virus spreads by infecting files, while a worm propagates in memory and over networks.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of virus does not use document macros to spread?

Macro virus

Worm

Trojan

Spyware

Answer explanation

A worm is a type of virus that does not use document macros to spread. Unlike macro viruses, worms can replicate and spread independently without relying on user interaction.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware self-replicates in memory and over computer networks?

Virus

Worm

Ransomware

Trojan

Answer explanation

Worms are a type of malware that self-replicates in memory and over computer networks, making them the correct choice for this question.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can malware infect your computer through web browsing?

By exploiting a vulnerability in the software installed on your computer

By outdated hardware

By a properly configured firewall

By using a strong password

Answer explanation

By exploiting a vulnerability in the software installed on your computer

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a potential consequence of an improperly configured firewall?

It may allow prohibited network traffic into or out of a network

It may cause hardware failure

It may slow down the computer

It may prevent software updates

Answer explanation

An improperly configured firewall may allow prohibited network traffic into or out of a network, leading to security vulnerabilities.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a human vulnerability that can be exploited by malicious people during social engineering?

Ability to be deceived or tricked

Outdated software

Weak passwords

Unused OS features

Answer explanation

The human vulnerability of being deceived or tricked can be exploited by malicious individuals during social engineering attacks.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does configuring data back-ups provide in the context of ransomware attacks?

Reduces the attack surface

Prevents malware infection

Provides a mechanism to recover from a ransomware attack

Increases computer speed

Answer explanation

Configuring data back-ups provides a mechanism to recover from a ransomware attack, allowing for restoration of encrypted files without paying the ransom.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?