What term is used to describe software designed to disrupt computer operations or gain unauthorized access without the user's knowledge or permission?
Cybersecurity Quiz 3

Quiz
•
Computers
•
10th Grade
•
Hard
Tan Siewchoo
FREE Resource
15 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Virus
Malware
Worm
Trojan horse
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How do worms differ from viruses?
Worms require user initiation
Viruses can run independently
Worms always slow down networks
Viruses replicate by exploiting vulnerabilities
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main characteristic that distinguishes a Trojan horse from a virus?
Trojan horses infect executable files
Viruses require user initiation
Trojan horses bind to non-executable files
Viruses mutate to avoid detection
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware holds a computer system or its data captive until a payment is made?
Logic Bomb
Ransomware
Backdoor
Spyware
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a browser hijacker?
To modify system files
To alter browser settings for redirection
To encrypt data on the computer
To replicate independently over networks
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary objective of social engineering attacks?
To exploit software vulnerabilities
To gain unauthorized access through technical means
To manipulate individuals into divulging information or performing actions
To launch malware attacks on computer networks
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is "pretexting" in the context of social engineering?
Requesting personal information in exchange for something
Lying to an individual to gain access to privileged data
Observing and picking up PINs through surveillance
Pretending to be a part of a large crowd to gain entry into a secure location
Create a free account and access millions of resources
Similar Resources on Quizizz
20 questions
020_Threat Actors–CompTIA Security+ SY0-701 – 2.1

Quiz
•
9th - 12th Grade
12 questions
Q1-Network Security

Quiz
•
10th Grade
10 questions
BTEC DIT C3 LAB - Why Systems Are Attacked

Quiz
•
10th - 11th Grade
15 questions
3.6 - Cyber Security

Quiz
•
10th Grade
10 questions
BTEC DIT C3 LAB - Device Hardening & Encryption

Quiz
•
10th - 11th Grade
18 questions
Forms of Network Attack

Quiz
•
10th Grade
13 questions
Types of malware

Quiz
•
10th - 11th Grade
14 questions
cyber security

Quiz
•
KG - Professional Dev...
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Taxes

Quiz
•
9th - 12th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
20 questions
Chapter 3 - Making a Good Impression

Quiz
•
9th - 12th Grade
20 questions
Inequalities Graphing

Quiz
•
9th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University