Virus informatici
Quiz by Simona Varallo
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
15 questions
Show answers
- Q1Qual è il principale scopo dei virus informatici?Diffondere messaggi di amoreCreare un gioco divertenteDanneggiare i computer, rubare dati sensibili, ottenere soldi tramite ricatti.Aiutare a risolvere problemi hardwareFornire informazioni utili agli utenti30s
- Q2Qual è la caratteristica distintiva dei virus informatici rispetto ad altri tipi di malware?La capacità di controllare le reti informaticheLa capacità di infettare solo i file di sistemaLa capacità di attaccare solo i computer connessi a internetLa capacità di auto replicarsi, come il virus biologico, all'interno di altri file o computer.La capacità di modificare il software installato30s
- Q3Quale è una possibile soluzione per proteggersi dai virus informatici?Utilizzare un antivirus e un antispyware per rilevare e rimuovere i virus, mantenere il software sempre aggiornato, essere cauti nell'aprire allegati o cliccare su link sospetti, fare copie di sicurezza dei dati importanti.Utilizzare solo software gratuitoRifiutare di aprire qualsiasi emailScaricare solo da siti Web ufficialiDisconnettersi dalla rete Internet30s
- Q4Qual è l'analogia tra i virus informatici e i virus biologici?Entrambi si replicano e si diffondono all'interno di un organismo o di un sistema, causando danni e malattie.Entrambi si diffondono solo attraverso la reteEntrambi sono facili da rilevare e rimuovereEntrambi sono creati dall'uomoEntrambi sono causati da hacker cattivi30s
- Q5Qual è un virus informatico?Un programma antivirusUn programma o una parte di codice realizzato per danneggiare i computer corrompendo nei file di sistema, sprecandone le risorse, distruggendo i dati o causando seccature di altro genere. Inoltre, si distingue da altre forme di malware per la capacità di auto replicarsi, come il virus biologico, all'interno di altri file o computer.Un dispositivo di archiviazione USBUn file di sistema importanteUn messaggio di posta elettronica sospetto30s
- Q6What is a virus in the context of cybersecurity?A type of malware that steals personal information and login credentials.A program that protects computers from malware and other threats.A software that replicates itself and spreads to other computers or files.A program or a piece of code designed to damage computers by corrupting system files, wasting resources, destroying data, or causing other types of disruption.A program that encrypts files and demands a ransom to restore access.30s
- Q7Which analogy is used to explain the concept of a computer virus?An analogy with biological viruses.An analogy with physical diseases.An analogy with malware and trojans.An analogy with computer networks and cybersecurity.An analogy with software development and coding.30s
- Q8What is a characteristic of a virus that distinguishes it from other types of malware?The ability to self-replicate and spread within other files or computers.The ability to steal personal information and login credentials.The ability to infect computers through email attachments.The ability to encrypt files and demand a ransom.The ability to exploit vulnerabilities in software systems.30s
- Q9Which type of malware is specifically designed to replicate itself rapidly and uncontrollably?AdwareWormTrojanRootkitSpyware30s
- Q10Which type of malware is disguised as legitimate software but carries out malicious activities?SpywareVirusTrojanWormRansomware30s
- Q11What is the purpose of antivirus and antispyware software?To monitor and secure network connections from unauthorized access.To detect, prevent, and remove malware and other threats from a computer system.To block unwanted advertisements and pop-ups on websites.To control and manage internet traffic on a computer system.To encrypt files and protect them from unauthorized access.30s
- Q12What is the importance of regularly updating antivirus software?To encrypt files and protect them from unauthorized access.To improve the performance and speed of a computer system.To update the antivirus database with new virus definitions.To ensure protection against the latest malware and vulnerabilities.To remove any malware that is currently present on the system.30s
- Q13Why is it important to have backups of important data?To ensure data is stored securely and encrypted.To prevent unauthorized access to sensitive information.To protect against physical damage or hardware failure.To mitigate the risk of data loss in case of malware infection or system failure.To recover lost or deleted files after accidental deletion.30s
- Q14What is the purpose of a firewall in the context of cybersecurity?To detect and remove malware and other threats from a computer system.To encrypt internet traffic and protect it from interception.To monitor and control network traffic, allowing only authorized connections.To monitor and manage user access to computer networks and resources.To prevent unauthorized access to a computer system or network.30s
- Q15What are some best practices for staying safe online?Using strong and unique passwords, avoiding suspicious emails and downloads, keeping software up to date, and being cautious with personal information.Using public WiFi networks, sharing personal information freely, and clicking on all links and attachments without caution.Visiting insecure websites with outdated security protocols, ignoring antivirus software, and disabling firewalls.Engaging in unsafe online behavior, such as sharing personal information openly and engaging with suspicious websites and pop-ups.Downloading software and media from unofficial sources, ignoring software updates, and having weak or repeated passwords.30s