Which of the following two are types of malware?

Y8_T4_L4_use of the bots

Quiz
•
Computers
•
8th Grade
•
Hard
David Wilkinson
FREE Resource
8 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Trojan
Worm
Firewall
Anti-virus
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of a computer virus?
Malicious software that self-replicates
Malicious software that disguises itself as something else
Malicious software that uses network bandwidth to deliberately disrupt the speed of the network
Malicious software that monitors every keystroke the user makes
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements best describes a "worm"?
Self replicates and encrypts files to make them inaccessible
Self replicates, does not attach to files, but is designed to take up system resources to slow down the network or computer
Attaches to files and is designed to take up system resources to slow down the network or computer. Does not self replicate.
Malicious software that monitors every keystroke the user makes
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Wannacry virus was an example of which type of attack?
Spyware
DDoS
Brute force
Ransomware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following wouldn't an internet bot perform?
DDoS attack
Finding new websites for search engines to index
Brute force
Shouldering
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common characteristic of phishing attacks?
Encrypting files to make them inaccessible
Disguising as a trustworthy entity to steal sensitive information
Using network bandwidth to slow down the network
Monitoring every keystroke the user makes
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware is designed to spread from one computer to another without human interaction?
Trojan
Adware
Worm
Spyware
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a Trojan horse?
Malicious software that self-replicates
Malicious software that disguises itself as legitimate software
Malicious software that uses network bandwidth to disrupt the network
Malicious software that monitors every keystroke the user makes
Similar Resources on Quizizz
10 questions
Cyber Security

Quiz
•
8th Grade
13 questions
Cybersecurity

Quiz
•
6th - 8th Grade
10 questions
Network security

Quiz
•
8th - 9th Grade
5 questions
Yr 9.1.4 Cybersecurity: Rise of the Bots

Quiz
•
8th Grade
12 questions
CamTech Network Security

Quiz
•
8th - 12th Grade
12 questions
S1 ICT Internet Safety

Quiz
•
8th Grade
13 questions
Quiz 3: Internet safety, cyber security and encryption

Quiz
•
7th - 8th Grade
12 questions
Social Engineering Pt1

Quiz
•
8th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University
44 questions
El fin del año- 7th

Quiz
•
7th - 12th Grade
40 questions
Word Study Assessment: Roots, Prefixes, Suffixes, and Vocabulary

Quiz
•
8th Grade
17 questions
guess the logo

Quiz
•
8th Grade
16 questions
Function or Non-Function?

Quiz
•
8th - 10th Grade
15 questions
Sentence Fragments and Run-ons

Quiz
•
8th Grade