Lesson 4: Malware Question Preview (ID: 45898)
Malware.
TEACHERS: click here for quick copy question ID numbers.
Although the Internet can make your life easier, it can also expose you and your computer to cyber security ________, such as viruses, malware, scams and identity theft.
a) threats
b) offers
c) software
d) malware
___________ is any program or file that is designed to damage a computer, tablet, or smartphone, or to gain unauthorized access to a device.
a) virus
b) malware
c) spyware
d) trojan
Any ________, tablet, or smartphone can be damaged by malware, no matter who manufactured it.
a) person
b) car
c) computer
d) school
________, these are URLs that may lead the user to download a virus or redirect the user to a Web site that will attempt to download malware
a) phishing
b) worms
c) trojans
d) pharming
_______ are programs that look useful, but actually cause damage to your computer
a) trojans
b) worms
c) viruses
d) sphyware
__________ are fake e-mail message appearing to be from a trusted business, social network or other contact
a) pharming
b) phishing
c) libel
d) trojans
________ is malicious code that secretly watches your computer activity and sends the information over the Internet
a) A worm
b) A trojan
c) Spyware
d) A virus
_______ are malicious programs or code that damage or destroy data by attaching to a program or file in a victim computer
a) trojans
b) pharming
c) spyware
d) viruses
__________ are special types of viruses that can travel from computer to computer without human action
a) worms
b) trojans
c) phishing
d) pharming
A ____ is self-replicating and can multiply until it uses up the computer's resources
a) worm
b) virus
c) trojan
d) pharming
Viruses are spread by _____ action, such as sharing infected files
a) keystroke
b) animation
c) human
d) spyware
Spyware can secretly capture your _________ (including passwords) and compromise your identity
a) keystroke
b) picture
c) identity
d) torrent
The easiest way to become a victim of malware, spyware and viruses is through _________.
a) pop-ups
b) downloads
c) emails
d) scams
Which of the following is NOT a type of malware?
a) phishing
b) farming
c) trojans
d) viruses
Anytime a Web page asks for private information, such as a credit card or address, the user needs to be able to identify whether the Web page is ______.
a) safe
b) trustworthy
c) accurate
d) secure
A secure Web page will display a _____ icon somewhere in the browser window.
a) key
b) symbol
c) lock
d) green
When you purchase a computer, ____________ _________ is available to protect the computer from any virus-related harm. (two words)
a) virus software
b) anti-spyware softward
c) anti-virus software
d) spyware software
When choosing a password, use ________ devices to help you remember it.
a) numbers
b) mnemonic devices
c) letters
d) symbols
Play Games with the Questions above at ReviewGameZone.com
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 45898 in the upper right hand corner or click here.
To play games using the questions from above, visit ReviewGameZone.com and enter game ID number: 45898 in the upper right hand corner or click here.
TEACHERS / EDUCATORS
Log In | Sign Up / Register
Log In | Sign Up / Register