WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

10th Grade

19 Qs

quiz-placeholder

Similar activities

Cybersecurity Vocabulary 2022

Cybersecurity Vocabulary 2022

9th - 12th Grade

18 Qs

Hackers?

Hackers?

University

20 Qs

cybersecurity_1

cybersecurity_1

12th Grade

14 Qs

Malware

Malware

9th - 11th Grade

15 Qs

Computer Crimes and Computer Ethics

Computer Crimes and Computer Ethics

6th - 10th Grade

21 Qs

ONLINE SAFETY

ONLINE SAFETY

11th Grade

15 Qs

Computer Crime & Malware CW #1

Computer Crime & Malware CW #1

10th Grade

20 Qs

J808 4.1 Types of threats

J808 4.1 Types of threats

9th - 11th Grade

20 Qs

WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

Assessment

Quiz

Computers

10th Grade

Medium

Created by

Jordan Firth

Used 11+ times

FREE Resource

19 questions

Show all answers

1.

MATCH QUESTION

1 min • 1 pt

Match the following

A type of malicious software designed to block access to a system

Virus

Software that secretly monitors user activity

Spyware

Provides users with advertisements

Worm

A self-replicating program that spreads across networks

Adware

Attaches to files, spreads when download

Ransomware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the most common way mobile devices get infected with malware?

Scanning QR codes

Downloading apps from official app stores

Sending text messages

Using public Wi-Fi networks

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware infects the computer without the user's knowledge and will duplicate itself to slow the computer down?

Worm

Virus

Trojan horse

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a hacker that hacks with malicious intent?

Black hat hacker

Grey hat hacker

White hat hacker

Blue hat hacker

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware replicates itself on a system by modifying programs and inserting their own code?

Worm

Virus

Trojan horse

Adware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which form of attack is designed to bombard servers with useless requests until they become unresponsive?

Distributed Denial of Service (DDoS)

Brute force attack

Packet sniffing

SQL injection

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common method of malware distribution via email called?

Phishing

Firewalling

Spamming

Scareware

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?