Lesson 4.2 - Malware Basics

Lesson 4.2 - Malware Basics

12th Grade

15 Qs

quiz-placeholder

Similar activities

Recap on Malware

Recap on Malware

12th Grade

13 Qs

Malware Types

Malware Types

12th Grade

15 Qs

Computing Y7 Lesson4 Quiz

Computing Y7 Lesson4 Quiz

12th Grade - University

10 Qs

Cyber security

Cyber security

9th - 12th Grade

20 Qs

Network Advantages and Disadvantages

Network Advantages and Disadvantages

10th Grade - University

15 Qs

Cybersecurity Security MTA

Cybersecurity Security MTA

8th - 12th Grade

10 Qs

Threats to Data

Threats to Data

9th - 12th Grade

11 Qs

IT Unit 11 Cyber Security Key Terms

IT Unit 11 Cyber Security Key Terms

11th - 12th Grade

10 Qs

Lesson 4.2 - Malware Basics

Lesson 4.2 - Malware Basics

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Warren Maddox

Used 8+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a virus in the context of cybersecurity?

A piece of software that inserts copies of itself into applications and data

A hardware device that prevents unauthorized access

A type of malware that forces users to view advertising

A legitimate program that causes damage behind the scenes

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term 'propagate' mean in the context of worms?

To destroy data

To make an exact copy of itself

To encrypt files

To delete system files

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a trojan in cybersecurity?

A legitimate program that causes damage behind the scenes

A type of malware that forces users to view advertising

A program that can run independently and propagate itself

A piece of software that inserts copies of itself into applications and data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is NOT self-replicating?

Worm

Virus

Trojan

Adware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a self-replicating type of malware?

Adware

Spyware

Worm

Trojan

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the second stage of a worm attack?

Probing other machines

Penetrating the vulnerable machine

Downloading itself to the remote machine

Propagating itself by picking new machines

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is secretly installed into a system and can be very harmful?

Adware

Spyware

Virus

Worm

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?