0
0
Cybersecurityknowledge~5 mins

Malware types (virus, worm, trojan, ransomware) in Cybersecurity - Cheat Sheet & Quick Revision

Choose your learning style9 modes available
Recall & Review
beginner
What is a computer virus?
A computer virus is a type of malware that attaches itself to files or programs and spreads when those files are shared or opened. It can damage or delete data and slow down your computer.
Click to reveal answer
beginner
How does a worm differ from a virus?
A worm is malware that can spread by itself over networks without needing to attach to files. It can quickly infect many computers by exploiting network connections.
Click to reveal answer
beginner
What is a Trojan horse in cybersecurity?
A Trojan horse is malware disguised as something harmless or useful. When you open it, it can give attackers access to your computer or steal information.
Click to reveal answer
beginner
What does ransomware do?
Ransomware is malware that locks or encrypts your files and demands money (a ransom) to unlock them. It can stop you from using your own data until you pay.
Click to reveal answer
intermediate
Which malware type spreads without user action?
A worm spreads automatically over networks without needing the user to open files or programs, unlike viruses or Trojans.
Click to reveal answer
Which malware attaches itself to files and spreads when those files are shared?
AVirus
BWorm
CTrojan
DRansomware
Which malware can spread on its own through networks without user help?
AWorm
BVirus
CTrojan
DRansomware
What type of malware pretends to be a safe program but actually harms your computer?
AVirus
BWorm
CTrojan
DRansomware
Which malware locks your files and demands payment to unlock them?
AWorm
BRansomware
CTrojan
DVirus
Which malware requires you to open or run a file to infect your computer?
AWorm
BNone of the above
CRansomware
DVirus
Explain the main differences between a virus, worm, Trojan, and ransomware.
Think about how each malware spreads and what it does to your computer.
You got /4 concepts.
    Describe a real-life example or situation where ransomware could affect someone.
    Imagine losing access to your photos or work documents suddenly.
    You got /4 concepts.