
WJEC ICT - Chapter 3 - Malware
Authored by Jordan Firth
Computers
10th Grade
Used 15+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
19 questions
Show all answers
1.
MATCH QUESTION
1 min • 1 pt
Match the following
A self-replicating program that spreads across networks
Virus
Attaches to files, spreads when download
Spyware
Provides users with advertisements
Adware
Software that secretly monitors user activity
Ransomware
A type of malicious software designed to block access to a system
Worm
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the most common way mobile devices get infected with malware?
Scanning QR codes
Downloading apps from official app stores
Sending text messages
Using public Wi-Fi networks
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware infects the computer without the user's knowledge and will duplicate itself to slow the computer down?
Worm
Virus
Trojan horse
Spyware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What name is given to a hacker that hacks with malicious intent?
Black hat hacker
Grey hat hacker
White hat hacker
Blue hat hacker
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware replicates itself on a system by modifying programs and inserting their own code?
Worm
Virus
Trojan horse
Adware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which form of attack is designed to bombard servers with useless requests until they become unresponsive?
Distributed Denial of Service (DDoS)
Brute force attack
Packet sniffing
SQL injection
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a common method of malware distribution via email called?
Phishing
Firewalling
Spamming
Scareware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?