Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Lesson 4: Malware
Test Description: Malware
Instructions: Answer all questions to get your test result.
1) Although the Internet can make your life easier, it can also expose you and your computer to cyber security ________, such as viruses, malware, scams and identity theft.
A
software
B
threats
C
malware
D
offers
2) ___________ is any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
A
malware
B
trojan
C
spyware
D
virus
3) Any ________, tablet, or smartphone can be damaged by malware, no matter who manufactured it.
A
school
B
person
C
computer
D
car
4) ________, these are URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware
A
phishing
B
worms
C
trojans
D
pharming
5) _______ are programs that look useful, but actually cause damage to your computer
A
viruses
B
sphyware
C
trojans
D
worms
6) __________ are fake e-mail message appearing to be from a trusted business, social network or other contact
A
phishing
B
trojans
C
libel
D
pharming
7) ________ is malicious code that secretly watches your computer activity and sends the information over the Internet
A
Spyware
B
A worm
C
A virus
D
A trojan
8) _______ are malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer
A
trojans
B
viruses
C
pharming
D
spyware
9) __________ are special types of viruses that can travel from computer to computer without human action
A
worms
B
trojans
C
pharming
D
phishing
10) A ____ is self-replicating and can multiply until it uses up the computer's resources
A
trojan
B
worm
C
pharming
D
virus
11) Viruses are spread by _____ action, such as sharing infected files
A
human
B
animation
C
spyware
D
keystroke
12) Spyware can secretly capture your _________ (including passwords) and compromise your identity
A
identity
B
picture
C
torrent
D
keystroke
13) The easiest way to become a victim of malware, spyware and viruses is through _________.
A
pop-ups
B
emails
C
scams
D
downloads
14) Which of the following is NOT a type of malware?
A
trojans
B
viruses
C
phishing
D
farming
15) Anytime a Web page asks for private information, such as a credit card or address, the user needs to be able to identify whether the Web page is ______.
A
secure
B
trustworthy
C
safe
D
accurate
16) A secure Web page will display a _____ icon somewhere in the browser window.
A
key
B
lock
C
symbol
D
green
17) When you purchase a computer, ____________ _________ is available to protect the computer from any virus-related harm. (two words)
A
virus software
B
spyware software
C
anti-virus software
D
anti-spyware softward
18) When choosing a password, use ________ devices to help you remember it.
A
mnemonic devices
B
letters
C
numbers
D
symbols
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2023
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?