WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

10th Grade

19 Qs

quiz-placeholder

Similar activities

IT (data, viruses and more)

IT (data, viruses and more)

8th Grade - Professional Development

20 Qs

Assessment 08

Assessment 08

University

15 Qs

ICT WEBINAR QUIZ

ICT WEBINAR QUIZ

KG - Professional Development

20 Qs

Shared Data & Disaster Recovery

Shared Data & Disaster Recovery

11th Grade

15 Qs

Quiz on neural network unit II

Quiz on neural network unit II

University

16 Qs

GIS Unit-1

GIS Unit-1

University

15 Qs

KD 3.1_Aplikasi Pengolah Angka / Spreadsheet

KD 3.1_Aplikasi Pengolah Angka / Spreadsheet

10th Grade

15 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

Assessment

Quiz

Computers

10th Grade

Practice Problem

Medium

Created by

Jordan Firth

Used 11+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

Provides users with advertisements

Worm

Software that secretly monitors user activity

Virus

Attaches to files, spreads when download

Spyware

A type of malicious software designed to block access to a system

Adware

A self-replicating program that spreads across networks

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common way mobile devices get infected with malware?

Scanning QR codes

Downloading apps from official app stores

Sending text messages

Using public Wi-Fi networks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware infects the computer without the user's knowledge and will duplicate itself to slow the computer down?

Worm

Virus

Trojan horse

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a hacker that hacks with malicious intent?

Black hat hacker

Grey hat hacker

White hat hacker

Blue hat hacker

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware replicates itself on a system by modifying programs and inserting their own code?

Worm

Virus

Trojan horse

Adware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form of attack is designed to bombard servers with useless requests until they become unresponsive?

Distributed Denial of Service (DDoS)

Brute force attack

Packet sniffing

SQL injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method of malware distribution via email called?

Phishing

Firewalling

Spamming

Scareware

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?