Search Header Logo

Malware Knowledge Quiz

Authored by Jervee Hongoy

Computers

9th - 12th Grade

Malware Knowledge Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Any software designed to disrupt, damage, or gain unauthorized access to computer systems, networks, or devices.

Virus

Malicious Software

(Malware)

Phishing

Malefic Software

(Malware)

Answer explanation

The correct choice is 'Malicious Software (Malware)' as it encompasses any software intended to disrupt, damage, or gain unauthorized access to systems, which aligns with the definition provided.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Once the Virus is on your device which of the Following you do NOT want to do?

Seek Professional Help

Disconnect From The Internet

Act Normal, Ignore what's happening

Boot Your Device Into Safe Mode

Answer explanation

Ignoring the virus and acting normal can lead to further damage and data loss. It's crucial to take action, such as seeking professional help or disconnecting from the internet, to mitigate the threat.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This threat disguises itself as legitimate or useful software to deceive users into installing or executing it.

Trojan Horse

Virus

Rootkit

Adware

Answer explanation

A Trojan Horse disguises itself as legitimate software to trick users into installing it, unlike viruses, rootkits, or adware, which have different methods of operation. Thus, the correct answer is Trojan Horse.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This Threat is designed to secretly monitor and collect information about a user's activities on their device without their knowledge or consent.

Spyware

Adware

Spykids

Spyder

Answer explanation

The correct answer is Spyware, as it is specifically designed to secretly monitor and collect information about a user's activities without their knowledge or consent, unlike Adware, which focuses on advertisements.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This threat designed to secretly record every keystroke made on a computer or mobile device.

Rootkit

Rootbeer

Key Logger

Ransomware

Answer explanation

A Key Logger is a type of malware specifically designed to record every keystroke made on a device, making it the correct answer. Other options like Rootkit and Ransomware serve different purposes.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Once the Keylogger stole your password what tips do you NOT want to follow?

Disconnect your external devices such as mouse.

Reinstall Your Operating System

Run a Full Malware Scan

Boot into Safe Mode

Answer explanation

Disconnecting external devices like a mouse does not address the keylogger threat. Instead, focus on reinstalling the OS, running malware scans, or booting into safe mode to remove the keylogger and secure your system.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Threat that encrypts a victim's files or locks their system, rendering it inaccessible until a ransom is paid to the attacker.

Spyware

Ransomware

Adware

Underwear

Answer explanation

Ransomware is a type of malicious software that encrypts files or locks systems, making them inaccessible until a ransom is paid. This matches the description provided in the question, distinguishing it from spyware and adware.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?