Grade8_Worksheet2 (1)
Grade8_Worksheet2 (1)
2. What type of malware is often disguised as a legitimate program and can give hackers
control of your computer?
a) Worm
b) Trojan Horse
c) Virus
d) Adware
7. Which of these is a type of attack that involves overwhelming a server with traffic to
cause it to crash?
a) DDoS
b) Man-in-the-middle
c) Phishing
d) Social engineering
3. A VPN (Virtual Private Network) helps to anonymize your online activities by routing
your traffic through a private server.
5. Two-factor authentication requires the user to provide something they know (like a
password) and something they have (like a mobile device).
6. A firewall can monitor and block unauthorized access to a computer network.
10. Using complex passwords with a mix of letters, numbers, and symbols makes it harder
for attackers to guess them.
5. Explain the concept of "phishing" and how individuals can protect themselves from it.
1. a) Email attachments
2. b) Trojan Horse
3. b) Unpatched software
6. b) Using a VPN
7. a) DDoS
8. b) The user must authenticate in two different ways, e.g., password and phone verification
1. True
2. False (A strong password should include letters, numbers, and special characters.)
3. True
5. True
6. True
9. True
10. True
1. Encryption protects sensitive data by converting it into unreadable format using a key,
ensuring that even if intercepted, unauthorized parties cannot read it.
2. A virus requires a host file to spread and typically damages files, while a worm is self-
replicating and spreads independently across networks.
3. Regular updates patch vulnerabilities and improve security. Outdated software can have
security flaws that are commonly exploited by cybercriminals.
4. Antivirus software detects and removes malware (viruses, worms, etc.) from a computer,
helping to protect the system from malicious threats.
6. A firewall controls the incoming and outgoing traffic on a network, preventing unauthorized
access to the system and blocking malicious activities.
7. A Trojan Horse is a type of malware that disguises itself as a legitimate program to trick
users into installing it. Once installed, it can steal data, provide remote access to hackers,
or cause other types of damage.