0% found this document useful (0 votes)
83 views

C. Worms and Virus A. Adware

The document is a quiz about cybersecurity topics such as types of malware, phishing attacks, and proper online etiquette. It contains 10 multiple choice questions testing knowledge of worms and viruses, adware, spyware, ransomware, phishing, flaming, cyberbullying, and how users are judged online. The questions cover identifying different types of malicious programs, avoiding risky online behaviors, and following best practices for communicating respectfully online.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
83 views

C. Worms and Virus A. Adware

The document is a quiz about cybersecurity topics such as types of malware, phishing attacks, and proper online etiquette. It contains 10 multiple choice questions testing knowledge of worms and viruses, adware, spyware, ransomware, phishing, flaming, cyberbullying, and how users are judged online. The questions cover identifying different types of malicious programs, avoiding risky online behaviors, and following best practices for communicating respectfully online.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Empowerment Technologies - QUIZ 2

NAME:___________________________________________ Empowerment Technologies - QUIZ 2


SECTION:________________________DATE: 03/02/23
NAME:___________________________________________
Read each item carefully and choose the letter of the correct SECTION:________________________DATE: 03/02/23
answer.
Read each item carefully and choose the letter of the correct
1. What type of malicious program is designed to replicate answer.
itself and transfer from one computer to another either
through the internet or local networks or data storage like 1. What type of malicious program is designed to replicate
flash drives and CDs? A. Adware B. itself and transfer from one computer to another either
Spyware through the internet or local networks or data storage like
C. Worms and Virus D. Ransomeware flash drives and CDs? A. Adware B.
Spyware
2. What harmful online programs are designed to send you C. Worms and Virus D. Ransomeware
advertisements, mostly pop-up ads? A. Adware
B. Spyware C. Worms and Virus D. Ransomeware 2. What harmful online programs are designed to send you
advertisements, mostly pop-up ads? A. Adware
3. What harmful online program is used to record keystrokes B. Spyware C. Worms and Virus D. Ransomeware
done by users to steal passwords? A. Adware
B. Spyware C. Worms and Virus D. Ransomeware 3. What harmful online program is used to record keystrokes
done by users to steal passwords? A. Adware
4. What is ransomware based on? B. Spyware C. Worms and Virus D. Ransomeware
A. Fear of hackers B. Fear of the Internet
C. Fear of spyware D. Fear of losing important files 4. What is ransomware based on?
A. Fear of hackers B. Fear of the Internet
5. Which of the following is an example of a “phishing” C. Fear of spyware D. Fear of losing important files
attack?
A. Sending someone an email that contains a malicious link 5. Which of the following is an example of a “phishing”
that is disguised to look like an email from someone reliable. attack?
B. Creating a fake website that looks nearly identical to a real A. Sending someone an email that contains a malicious link
website in order to trick users into entering their login that is disguised to look like an email from someone reliable.
information. B. Creating a fake website that looks nearly identical to a real
C. Sending someone a text message looks like a notification website in order to trick users into entering their login
that the person has won a contest. information.
D. Sending someone an email that records their keystroke C. Sending someone a text message looks like a notification
activities while using their computers. that the person has won a contest.
D. Sending someone an email that records their keystroke
activities while using their computers.
6. Which of the following must NOT be done if you received 6. Which of the following must NOT be done if you received
an embarrassing picture from your friend? an embarrassing picture from your friend?
A. Tell your parents or teachers A. Tell your parents or teachers
B. Send the picture on to other friends B. Send the picture on to other friends
C. Talk to your friend about its negative outcomes. C. Talk to your friend about its negative outcomes.
D. Discourage your friend from sending pictures like that. D. Discourage your friend from sending pictures like that.

7. What is a flame in cyberspace? 7. What is a flame in cyberspace?


A. A person who follows the rules of Netiquette. A. A person who follows the rules of Netiquette.
B. An expert programmer. B. An expert programmer.
C. An online chain letter. C. An online chain letter.
D. A post or email message that expresses a strong opinion D. A post or email message that expresses a strong opinion or
or criticism. criticism.

8. What is considered shouting over the Internet? 8. What is considered shouting over the Internet?
A. Screaming at your computer. A. Screaming at your computer.
B. Writing in all CAPS. B. Writing in all CAPS.
C. Putting a lot of exclamation marks at the end of a sentence. C. Putting a lot of exclamation marks at the end of a sentence.
D. Not answering a friend request on Facebook. D. Not answering a friend request on Facebook.

9. To avoid being cyber-bullied you should always... 9. To avoid being cyber-bullied you should always...
A. Give out personal information to anyone who asks. A. Give out personal information to anyone who asks.
B. Strike first - post mean things about other people on your B. Strike first - post mean things about other people on your
Wall on Facebook. Wall on Facebook.
C. Observe proper netiquette rules. C. Observe proper netiquette rules.
D. Ignore any requests from people to be your friend online. D. Ignore any requests from people to be your friend online.

10.How are you judged in cyberspace? 10.How are you judged in cyberspace?
A. No one can see you, so no one can judge you. A. No one can see you, so no one can judge you.
B. You are judged by what you do on the Internet and how it B. You are judged by what you do on the Internet and how it
looks - by your spelling, grammar, and netiquette. looks - by your spelling, grammar, and netiquette.
C. You are judged by your intent - if you didn't mean to hurt C. You are judged by your intent - if you didn't mean to hurt
someone's feelings, then it's okay. someone's feelings, then it's okay.
D. You D. You

You might also like