7/18/25, 12:23 AM Computer Security | Wayground
Worksheets Name
Computer Security
Class
Total questions: 19
Worksheet time: 9mins
Date
Instructor name: Mr. King CHEN
1. If a virus "Replicates" itself, what is it doing?
a) Copying itself b) Copying other data
c) Changing itself d) Deleting itself
2. If someone uses your personal information to sign up for a website without your agreement, this is
called?
a) Identity Theft b) A Prank
c) Cyberbullying d) Phishing
3. Standalone malware computer program that replicates itself in order to spread to other computers.
Often, it uses a computer network to spread itself, relying on security failures on the target computer
to access it.
a) Anti Virus Software b) Malicious Code
c) Computer Worm d) Computer Virus
4. type of malicious software program (malware) that, when executed, replicates by reproducing itself
(copying its own source code) or infecting other computer programs by modifying them.
a) Computer Worm b) Computer Virus
c) MyDoom d) Malicious Code
5. what is the name of an application that appears to look like a helpful application but instead does
harm to your computer?
a) worm b) virus
c) Trojan horse d) malware
https://wayground.com/print/quiz/5f889c879e4e09001b4a0d07 1/4
7/18/25, 12:23 AM Computer Security | Wayground
6. IT security recently found a program on your co-worker's computer that apparently tracked all of the
words that they typed into the computer. what kind of malware is this?
a) Keylogger b) trojan horse
c) keystroke virus d) keyblogger
7. Rose just installed a new search engine on her laptop.now whenever she searches the internet, she
gets several pop-up windows directing her to buy products.what does rose have?
a) trojan horse b) ransomware
c) Adware d) spyware
8. you receive an email from your bank,telling you that your account has been compromised and you
need to validate your account details or else your account will be closed. you are supposed to click a
link to validate your information. what is this an example of?
a) Phishing b) spam
c) ransomware d) a security breach at your bank that needs to
be resolved
9.
What type of malware was the 'wannacry' attack?
a) Spyware b) Trojan
c) Ransomware d) Phishing
10.
What do you call a device or program which monitors network traffic to prevent attacks?
a) Trojan b) Firewall
c) Spam d) Cyber blocker
11.
What does 'DOS' attack stand for
a) Doom of System b) Don't Open Service
c) Didn't Order Security d) Denial of Service
https://wayground.com/print/quiz/5f889c879e4e09001b4a0d07 2/4
7/18/25, 12:23 AM Computer Security | Wayground
12.
'Brute Force' attacks consist of...
a) Hitting a computer programmer b) Hitting the computer hard
c) Guessing a password repeatedly d) Destroying files
13. It help prevent attackers from monitoring or recording traffic between resources and computers.
a) Firewall b) Data Encryption
c) Antivirus
14. Hacking for a cause is called:
a) Hacktivism b) Activism
c) Black-hat hacking d) Active hacking
15. What is meant by the term 'white hat hacker'?
a) Ethical hacker – paid by companies to test b) Illegal hacker – intent on doing harm, stealing
their systems fro vulnerabilities. for personal gain e.g. taking credit card
details.
c) Doesn’t necessarily steal but may access IT
systems without permission which is still
illegal.
16. What is meant by a 'grey hat hacker'?
a) Doesn’t necessarily steal but may access IT b) Illegal hacker – intent on doing harm, stealing
systems without permission which is still for personal gain e.g. taking credit card
illegal. details.
c) Ethical hacker – paid by companies to test
their systems fro vulnerabilities.
17. What is meant by a 'black hat hacker'?
a) Ethical hacker – paid by companies to test b) Illegal hacker – intent on doing harm, stealing
their systems fro vulnerabilities. for personal gain e.g. taking credit card
details.
c) Doesn’t necessarily steal but may access IT
systems without permission which is still
illegal.
https://wayground.com/print/quiz/5f889c879e4e09001b4a0d07 3/4
7/18/25, 12:23 AM Computer Security | Wayground
18. What law was introduced so that hackers could be prosecuted?
a) The Distance Selling Regulations b) The Computer Misuse Act
c) The Data Protection Act d) The Copyright, Designs & Patents Act
19. With penetration testing, the professional hacker is given permission by the company to attempt to
break into their system.
a) False b) True
https://wayground.com/print/quiz/5f889c879e4e09001b4a0d07 4/4