
[AP CSP] Unit 5 Review: Internet & Cybersecurity
Authored by Tommy Nguyen
Computers
9th - 12th Grade
Internet covered
Used 8+ times
![[AP CSP] Unit 5 Review: Internet & Cybersecurity](https://cf.quizizz.com/img/studentpreview.webp)
AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
57 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware is primarily designed to display unwanted advertisements on your computer?
Spyware
Adware
Ransomware
Worms
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware is known for encrypting files and demanding payment for their release?
Botnets
Trojans
Ransomware
Adware
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Explain how a worm differs from a virus in terms of its propagation method.
Worms require user action to spread, while viruses do not.
Worms spread automatically without user intervention, while viruses need a host file.
Worms attach themselves to files, while viruses spread through networks.
Worms are harmless, while viruses are always destructive.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Identify the primary function of spyware.
To encrypt files and demand ransom
To display unwanted ads
To secretly monitor and collect user information
To create a network of infected computers
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes a Trojan horse?
A self-replicating program that spreads through networks
A program that appears legitimate but performs malicious activities
A network of infected computers controlled remotely
A program that encrypts files and demands payment
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Discuss the potential impact of a botnet on a network's security and performance.
Botnets can enhance network security by distributing tasks.
Botnets can slow down network performance and be used for coordinated attacks.
Botnets are harmless and do not affect network performance.
Botnets improve network speed by optimizing data flow.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which malware type is most likely to be used in a Distributed Denial of Service (DDoS) attack?
Adware
Spyware
Botnets
Ransomware
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?