General Malware
Virus
Trojan Horse
Phar/Phi/Bomb
Worm
100
A Malicious Software
What is Malware
100
How does a virus enter into your body?
What is mouth, nose, and breaks in skin
100
The people that won the battle of Troy.
Who are the Greeks
100
How do most phishing e-mails make the recipient feel?
What is fearful
100
How long it took for the ILOVE you virus to spread across the world.
What is less than a day.
200
The most damaging type of malware
What is a computer worm.
200
Where computer viruses come from.
What is the Internet
200
Where the rest of the Greek army hid while waiting for the raid on the Trojan City.
Where is in boats around the coast of Troy
200
What do hackers want to steal from people using Pharming or Phishing?
What is personal information
200
What unique trait an earthworm possesses.
What is able to break in half and both sides still live.
300
A pop-up that says "Free Virus Software" is an example of what
What is a Trojan Horse
300
2 symptoms of a virus on a computer
What is shuts down then restarts, slow, frozen, pop-ups, glitches.
300
The Trojans never lost a battle because
What is the walls of the city were so high and strong they could not be breeched
300
The type of bomb that needs to be triggered
What is a logic bomb
300
The amount of money in damage caused by the ILOVEYOU virus
What is 5.5 billion dollars
400
The 2 malware effecting the hard drive that do not multiply themselves.
What is Trojan Horse, and a Bomb
400
If a virus has been downloaded onto your computer it takes time before the effects of the virus show, true or false?
What is true
400
The tale of Troy is found a Latin poem.
What is the Aeneid
400
How a bomb is different than a Trojan Horse
What is a Trojan horse looks pretty and appealing, a bomb is hidden in anything, it does not need to be pretty.
400
A computer worm carries what with it when it spreads to other computers?
What is a virus
500
The LAST step you would take to remove a Malware infection from your computer
What is do a recovery/reboot of the computer
500
The 4 step cycle of a computer virus on a computer.
What is Enters through human action, attaches to document or program, multiplies itself, spreads through computer.
500
Explain what the Trojan horse in Troy has to do with a Trojan Horse malware on a computer.
What is they both appear to be a friendly, nice gift that end up leading to destruction.
500
How do the IP address and Domain name relate?
What is they are the same thing: IP address is in numerical code (53732839_342_) and the Domain name is the written website (www.google.com)
500
Why the ILOVEYOU virus spread so fast and how it was stopped.
What is sent through e-mail from someone you knew and stopped by word of mouth/the news.
M
e
n
u