
Cyber Threat Knowledge Assessment
Authored by Darling Joslin
Computers
9th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is malware?
A type of hardware used to protect computers.
Malicious software designed to harm, exploit, or otherwise compromise a computer system.
A software that helps speed up your computer.
A program that only updates your operating system.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a computer virus?
A type of malware that only affects mobile devices.
A program that protects computers from threats.
A type of malware that attaches itself to a program or file, enabling it to spread from one computer to another.
A type of hardware that stores data.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a characteristic of malware?
Can compromise a computer system.
Can be spread through computer networks.
Designed to protect computer systems.
Designed to harm or exploit computer systems.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a Trojan in the context of cybersecurity?
A type of malware that disguises itself as legitimate software to trick users into loading and executing the malware on their systems.
A method of bypassing normal authentication.
A network of infected computers controlled by a single attacker.
A type of malware that provides remote control to attackers.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware allows an attacker to have remote control over an infected computer?
RAT (Remote Access Trojan)
Trojan
Backdoor
Botnet
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the primary function of a backdoor in cybersecurity?
A method of bypassing normal authentication to gain unauthorized access to a system.
A type of malware that disguises itself as legitimate software.
A type of malware that provides remote control to attackers.
A network of infected computers used for DDoS attacks.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a botnet commonly used for?
Bypassing authentication to gain unauthorized access.
Disguising malware as legitimate software.
Providing remote control to attackers.
Performing DDoS attacks using a network of infected computers controlled by a single attacker or group.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Uso del Aula VIrtual
Quiz
•
1st Grade - University
17 questions
Ergonomics and Keyboard
Quiz
•
9th Grade
20 questions
MS EXCEL
Quiz
•
8th - 10th Grade
20 questions
BÀI KTTX SỐ 2
Quiz
•
9th Grade
15 questions
Informatika 9
Quiz
•
9th Grade
16 questions
Input Device
Quiz
•
9th - 10th Grade
16 questions
Conditions
Quiz
•
8th - 10th Grade
16 questions
Microcontrolere Noțiuni generale. Structura internă
Quiz
•
KG - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
14 questions
[AP CSP] JavaScript Programming Quiz
Quiz
•
9th - 12th Grade
10 questions
Understanding Computers and Computer Engineering
Interactive video
•
7th - 12th Grade
37 questions
Python - Tuples, Lists, and List Methods
Quiz
•
9th - 12th Grade
60 questions
MOS Word Home, Insert, Reference Ribbon Basics
Quiz
•
9th Grade