Y8_T4_L4_use of the bots

Y8_T4_L4_use of the bots

8th Grade

8 Qs

quiz-placeholder

Similar activities

Spreadsheets

Spreadsheets

6th - 8th Grade

13 Qs

Copyright & Fair Use scenarios

Copyright & Fair Use scenarios

6th - 8th Grade

8 Qs

Grade-8

Grade-8

8th Grade

10 Qs

ITwelve – Kuis umum

ITwelve – Kuis umum

5th - 11th Grade

11 Qs

Cyber Security

Cyber Security

1st - 10th Grade

10 Qs

Grade 8

Grade 8

8th Grade

10 Qs

Programs and Variables in Code and Play

Programs and Variables in Code and Play

5th - 9th Grade

7 Qs

Google Aptitude Test

Google Aptitude Test

KG - University

10 Qs

Y8_T4_L4_use of the bots

Y8_T4_L4_use of the bots

Assessment

Quiz

Computers

8th Grade

Practice Problem

Hard

Created by

David Wilkinson

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

8 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which of the following two are types of malware?

Trojan

Worm

Firewall

Anti-virus

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the definition of a computer virus?

Malicious software that self-replicates

Malicious software that disguises itself as something else

Malicious software that uses network bandwidth to deliberately disrupt the speed of the network

Malicious software that monitors every keystroke the user makes

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements best describes a "worm"?

Self replicates and encrypts files to make them inaccessible

Self replicates, does not attach to files, but is designed to take up system resources to slow down the network or computer

Attaches to files and is designed to take up system resources to slow down the network or computer. Does not self replicate.

Malicious software that monitors every keystroke the user makes

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Wannacry virus was an example of which type of attack?

Spyware

DDoS

Brute force

Ransomware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following wouldn't an internet bot perform?

DDoS attack

Finding new websites for search engines to index

Brute force

Shouldering

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common characteristic of phishing attacks?

Encrypting files to make them inaccessible

Disguising as a trustworthy entity to steal sensitive information

Using network bandwidth to slow down the network

Monitoring every keystroke the user makes

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware is designed to spread from one computer to another without human interaction?

Trojan

Adware

Worm

Spyware

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?