9 spr1 Cybersecurity Lesson 1

9 spr1 Cybersecurity Lesson 1

8th Grade

12 Qs

quiz-placeholder

Similar activities

Hackers and Malware

Hackers and Malware

8th Grade

15 Qs

IT Security & Encryption of Data

IT Security & Encryption of Data

8th - 10th Grade

15 Qs

Antivirus

Antivirus

7th - 8th Grade

10 Qs

Social Engineering Pt1

Social Engineering Pt1

8th Grade

12 Qs

Types of Malware

Types of Malware

6th - 9th Grade

14 Qs

Malware

Malware

7th - 11th Grade

15 Qs

Cyber Security

Cyber Security

8th - 12th Grade

10 Qs

Term 6 - Quiz 3

Term 6 - Quiz 3

7th - 9th Grade

11 Qs

9 spr1 Cybersecurity Lesson 1

9 spr1 Cybersecurity Lesson 1

Assessment

Quiz

Computers

8th Grade

Medium

Created by

Thomas Reynolds

Used 8+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What type of malware is active if a user's computer has been locked and is displaying a message demanding payment to unlock it?
Ransomware
Adware
Trojan Horse
Worm

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does adware do?
Shows adverts, e.g., intrusive popups. May contain other malware.
Takes control of a system.
Appears to be useful but installs additional malware.
Collects data and sends it back to a third party.

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is the difference between a virus and a worm?
A virus spreads by attaching itself to files; a worm can self-replicate.
A worm spreads by attaching itself to files; a virus can self-replicate
A virus is a standalone program, whereas a worm attaches to other files.
A worm is a standalone program, whereas a virus attaches to other files.

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does a bot do?
Takes control of a system and can form part of a botnet.
Appears to be useful but installs additional malware.
Enables an unauthorised user to gain control without being detected.
Shows adverts, e.g., intrusive popups.

5.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does spyware do?
Collects data and sends it back to a third party.
Takes control of a system.
Appears to be useful but installs additional malware.
Enables an unauthorised user to gain control without being detected.

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What does a Trojan horse do?
Appears to be useful but installs additional malware.
Takes control of a system.
Collects data and sends it back to a third party.
Enables an unauthorised user to gain control without being detected.

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Why would someone want to steal or destroy data?
Data is valuable.
They are bored.
It's a school assignment.
They don't know how to create data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?