Malware Quiz NVHS U1

Malware Quiz NVHS U1

11th Grade

20 Qs

quiz-placeholder

Similar activities

Network Topologies & Malware

Network Topologies & Malware

6th - 12th Grade

17 Qs

Software, Unit 3 Quiz Review

Software, Unit 3 Quiz Review

9th Grade - University

15 Qs

BTEC Level 2 Technology Systems W1-4

BTEC Level 2 Technology Systems W1-4

11th - 12th Grade

15 Qs

Networking

Networking

9th - 11th Grade

21 Qs

History of Computers & Internet Quiz

History of Computers & Internet Quiz

9th - 12th Grade

20 Qs

BTEC IT Unit 1 - D threats to data & laws

BTEC IT Unit 1 - D threats to data & laws

11th - 12th Grade

20 Qs

GCSE 3.4 Computer systems - Hardware & Software

GCSE 3.4 Computer systems - Hardware & Software

9th - 11th Grade

19 Qs

Internettet og computeren

Internettet og computeren

11th - 12th Grade

16 Qs

Malware Quiz NVHS U1

Malware Quiz NVHS U1

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Wayground Content

Used 11+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A piece of code that can copy itself and damage the system or destroy data.
Computer Virus
Computer Code
Computer Hacker

Don't pick this one

2.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a Logic Bomb?
Bombs that detonate online when hackers play a code.
a set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects.
An intelligent bomb.
malicious software or code that is considered to fall in the "grey area" between normal software and a virus.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common method used by attackers to disguise malware as legitimate software?

Phishing

Trojan Horse

Two-factor Authentication

Firewall

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of programs installed by an attacker to gain control of a device.

Rootkit

Logic Bomb

Backdoor

Zero Day

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The type of program that attaches itself to a host file and replicates itself on a system

6.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Name a type of malware:
Caterpillars
Worms
Lions
Horses

7.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

What is a Trojan Horse?
A program designed to take down the computer system while performing an inoffensive task.
a hollow wooden statue of a horse in which the Greeks concealed themselves in order to enter Troy.
A different type of horse.
A chess piece.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?