J277|4.1 Network threats

J277|4.1 Network threats

9th Grade

15 Qs

quiz-placeholder

Similar activities

Konsep Routing

Konsep Routing

1st - 10th Grade

10 Qs

Cyber Security Homework 1

Cyber Security Homework 1

7th - 9th Grade

15 Qs

Kuis Webinar Cerdas Bertelekomunikasi OTP Fraud

Kuis Webinar Cerdas Bertelekomunikasi OTP Fraud

6th Grade - Professional Development

10 Qs

Паскаль. Основные команды

Паскаль. Основные команды

8th - 11th Grade

10 Qs

Binary

Binary

6th - 9th Grade

11 Qs

Access

Access

1st - 10th Grade

10 Qs

C# lesson10

C# lesson10

1st - 10th Grade

10 Qs

Excel - basic

Excel - basic

9th Grade

15 Qs

J277|4.1 Network threats

J277|4.1 Network threats

Assessment

Quiz

Computers

9th Grade

Practice Problem

Easy

Created by

Wayne Vaughan

Used 13+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary purpose of malware?

To enhance computer performance

To harm computers and/or data

To provide free software updates

To secure network connections

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a type of malware mentioned in the presentation?

Viruses

Worms

Firewalls

Ransomware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do computer viruses primarily spread and cause harm?

By encrypting files for ransom

By replicating their code in other programs and infecting computers

By slowing down networks without causing damage

By pretending to be legitimate software

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key characteristic of a worm?

It holds a computer hostage by encrypting data

It hides malicious code inside a legitimate-looking program

It replicates itself to spread to other computers, often slowing down networks

It tries every combination of password until the correct one is found

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A Trojan horse is described as similar to the story of the Trojan War because:

It involves a direct, forceful attack on a system.

It hides malicious code within something the user wants, then executes it.

It floods a server with requests.

It intercepts communication between a user and a server.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main objective of ransomware?

To delete files permanently from a computer

To trick users into revealing personal information

To hold a computer hostage by locking or encrypting data, demanding a ransom

To gain unauthorized access by observing someone type their password

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a technical vulnerability that hackers can exploit?

Using strong, unique passwords

Regularly updating anti-malware software

Not installing software updates and security patches

Encrypting data on mobile devices

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers