Review Game Zone
Flash Cards
(current)
Games
Teachers
Search
Lesson 4: Malware
Test Description: Malware
Instructions: Answer all questions to get your test result.
1) Although the Internet can make your life easier, it can also expose you and your computer to cyber security ________, such as viruses, malware, scams and identity theft.
A
software
B
offers
C
threats
D
malware
2) ___________ is any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
A
virus
B
spyware
C
trojan
D
malware
3) Any ________, tablet, or smartphone can be damaged by malware, no matter who manufactured it.
A
person
B
school
C
computer
D
car
4) ________, these are URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware
A
worms
B
pharming
C
phishing
D
trojans
5) _______ are programs that look useful, but actually cause damage to your computer
A
sphyware
B
trojans
C
worms
D
viruses
6) __________ are fake e-mail message appearing to be from a trusted business, social network or other contact
A
pharming
B
phishing
C
libel
D
trojans
7) ________ is malicious code that secretly watches your computer activity and sends the information over the Internet
A
A trojan
B
Spyware
C
A worm
D
A virus
8) _______ are malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer
A
trojans
B
pharming
C
spyware
D
viruses
9) __________ are special types of viruses that can travel from computer to computer without human action
A
phishing
B
pharming
C
worms
D
trojans
10) A ____ is self-replicating and can multiply until it uses up the computer's resources
A
worm
B
trojan
C
virus
D
pharming
11) Viruses are spread by _____ action, such as sharing infected files
A
animation
B
spyware
C
human
D
keystroke
12) Spyware can secretly capture your _________ (including passwords) and compromise your identity
A
keystroke
B
picture
C
torrent
D
identity
13) The easiest way to become a victim of malware, spyware and viruses is through _________.
A
emails
B
scams
C
pop-ups
D
downloads
14) Which of the following is NOT a type of malware?
A
phishing
B
trojans
C
farming
D
viruses
15) Anytime a Web page asks for private information, such as a credit card or address, the user needs to be able to identify whether the Web page is ______.
A
safe
B
trustworthy
C
accurate
D
secure
16) A secure Web page will display a _____ icon somewhere in the browser window.
A
key
B
lock
C
green
D
symbol
17) When you purchase a computer, ____________ _________ is available to protect the computer from any virus-related harm. (two words)
A
virus software
B
anti-virus software
C
anti-spyware softward
D
spyware software
18) When choosing a password, use ________ devices to help you remember it.
A
letters
B
symbols
C
mnemonic devices
D
numbers
*select an answer for all questions
Check Results & Get Answers
Play Games with the Questions Above
Teachers: Create FREE classroom games with your questions
Click for more info!
©2007-2022
ReviewGameZone.com
|
About
|
Privacy
|
Contact
|
Terms
|
Site Map
WAIT! Find what you needed?
×
Still Looking for the Answers?
Have Another Question?
Play a Review Game with These Questions?
Want to Make Your Own Test Like This One?