Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Lesson 4: Malware
Test Description: Malware
Instructions: Answer all questions to get your test result.
1) Although the Internet can make your life easier, it can also expose you and your computer to cyber security ________, such as viruses, malware, scams and identity theft.
A
software
B
threats
C
offers
D
malware
2) ___________ is any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
A
malware
B
virus
C
spyware
D
trojan
3) Any ________, tablet, or smartphone can be damaged by malware, no matter who manufactured it.
A
person
B
school
C
computer
D
car
4) ________, these are URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware
A
pharming
B
trojans
C
phishing
D
worms
5) _______ are programs that look useful, but actually cause damage to your computer
A
trojans
B
worms
C
sphyware
D
viruses
6) __________ are fake e-mail message appearing to be from a trusted business, social network or other contact
A
pharming
B
libel
C
trojans
D
phishing
7) ________ is malicious code that secretly watches your computer activity and sends the information over the Internet
A
A worm
B
Spyware
C
A virus
D
A trojan
8) _______ are malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer
A
viruses
B
spyware
C
trojans
D
pharming
9) __________ are special types of viruses that can travel from computer to computer without human action
A
trojans
B
phishing
C
worms
D
pharming
10) A ____ is self-replicating and can multiply until it uses up the computer's resources
A
virus
B
trojan
C
worm
D
pharming
11) Viruses are spread by _____ action, such as sharing infected files
A
human
B
animation
C
keystroke
D
spyware
12) Spyware can secretly capture your _________ (including passwords) and compromise your identity
A
identity
B
picture
C
keystroke
D
torrent
13) The easiest way to become a victim of malware, spyware and viruses is through _________.
A
pop-ups
B
emails
C
downloads
D
scams
14) Which of the following is NOT a type of malware?
A
farming
B
trojans
C
viruses
D
phishing
15) Anytime a Web page asks for private information, such as a credit card or address, the user needs to be able to identify whether the Web page is ______.
A
safe
B
secure
C
accurate
D
trustworthy
16) A secure Web page will display a _____ icon somewhere in the browser window.
A
key
B
symbol
C
lock
D
green
17) When you purchase a computer, ____________ _________ is available to protect the computer from any virus-related harm. (two words)
A
spyware software
B
anti-virus software
C
anti-spyware softward
D
virus software
18) When choosing a password, use ________ devices to help you remember it.
A
symbols
B
letters
C
mnemonic devices
D
numbers
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2024
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?