
Y8_T4_L4_use of the bots

Quiz
•
Computers
•
8th Grade
•
Hard
David Wilkinson
FREE Resource
8 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Which of the following two are types of malware?
Trojan
Worm
Firewall
Anti-virus
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the definition of a computer virus?
Malicious software that self-replicates
Malicious software that disguises itself as something else
Malicious software that uses network bandwidth to deliberately disrupt the speed of the network
Malicious software that monitors every keystroke the user makes
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following statements best describes a "worm"?
Self replicates and encrypts files to make them inaccessible
Self replicates, does not attach to files, but is designed to take up system resources to slow down the network or computer
Attaches to files and is designed to take up system resources to slow down the network or computer. Does not self replicate.
Malicious software that monitors every keystroke the user makes
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The Wannacry virus was an example of which type of attack?
Spyware
DDoS
Brute force
Ransomware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which one of the following wouldn't an internet bot perform?
DDoS attack
Finding new websites for search engines to index
Brute force
Shouldering
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common characteristic of phishing attacks?
Encrypting files to make them inaccessible
Disguising as a trustworthy entity to steal sensitive information
Using network bandwidth to slow down the network
Monitoring every keystroke the user makes
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware is designed to spread from one computer to another without human interaction?
Trojan
Adware
Worm
Spyware
8.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a Trojan horse?
Malicious software that self-replicates
Malicious software that disguises itself as legitimate software
Malicious software that uses network bandwidth to disrupt the network
Malicious software that monitors every keystroke the user makes
Similar Resources on Wayground
12 questions
Year 9 Networks Knowledge Check

Quiz
•
8th Grade - University
9 questions
Internal Computer Parts

Quiz
•
7th - 8th Grade
12 questions
IOTA Chapter 1 Wired Networks

Quiz
•
8th Grade
10 questions
Fundamentals of Cybersecurity Check Understanding Activity

Quiz
•
6th - 8th Grade
13 questions
Quiz 3: Internet safety, cyber security and encryption

Quiz
•
7th - 8th Grade
10 questions
Computer Viruses

Quiz
•
6th - 10th Grade
12 questions
8RS 8.3.6 PLENARY

Quiz
•
8th Grade
13 questions
Information technology

Quiz
•
8th Grade
Popular Resources on Wayground
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
9/11 Experience and Reflections

Interactive video
•
10th - 12th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
9 questions
Tips & Tricks

Lesson
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
15 questions
Acceptable Use Policy (Quiz)

Quiz
•
6th - 8th Grade
25 questions
Career Vs. Job

Quiz
•
6th - 8th Grade
20 questions
Digital Citizenship

Quiz
•
8th - 12th Grade
30 questions
Introduction to Computers

Quiz
•
8th - 9th Grade
20 questions
Copyright and Fair Use

Quiz
•
6th - 8th Grade
15 questions
Computer Components Video

Interactive video
•
8th Grade
20 questions
Hardware vs. Software Quiz

Quiz
•
7th - 10th Grade