0
0
Intro to Computingfundamentals~20 mins

Common threats (malware, phishing, ransomware) in Intro to Computing - Practice Problems & Coding Challenges

Choose your learning style9 modes available
Challenge - 5 Problems
🎖️
Threat Mastery Badge
Get all challenges correct to earn this badge!
Test your skills under time pressure!
🧠 Conceptual
intermediate
2:00remaining
Identify the type of threat from a scenario
You receive an email that looks like it is from your bank asking you to click a link and enter your password to verify your account. What type of threat is this?
ASpyware
BRansomware
CMalware
DPhishing
Attempts:
2 left
💡 Hint
Think about what the attacker wants: your personal information by tricking you.
🧠 Conceptual
intermediate
2:00remaining
Understanding ransomware behavior
A computer suddenly shows a message demanding payment to unlock files. What has most likely happened?
AThe computer is running a software update
BThe computer has a virus that deletes files
CThe computer is infected with ransomware
DThe computer is infected with spyware
Attempts:
2 left
💡 Hint
Think about what ransomware does to your files and what it demands.
trace
advanced
2:00remaining
Trace the infection path of malware
A user downloads a free game from an unknown website. Soon after, their computer slows down and shows many pop-up ads. What type of malware is most likely causing this?
AAdware
BRansomware
CTrojan horse
DWorm
Attempts:
2 left
💡 Hint
Think about malware that causes unwanted ads and slows down the computer.
identification
advanced
2:00remaining
Identify the threat from a description of its effect
Which threat type secretly records your keystrokes to steal passwords and credit card numbers?
ASpyware
BRansomware
CVirus
DPhishing
Attempts:
2 left
💡 Hint
This threat spies on your activity without your knowledge.
Comparison
expert
3:00remaining
Compare malware types by their main goal
Match each threat to its primary goal:

1. Ransomware
2. Phishing
3. Worm
4. Trojan horse

Options:
A. Spread copies of itself to other computers
B. Trick users into revealing sensitive information
C. Lock files and demand payment
D. Disguise as legitimate software to cause harm
A1:D, 2:C, 3:B, 4:A
B1:C, 2:B, 3:A, 4:D
C1:B, 2:A, 3:D, 4:C
D1:A, 2:D, 3:C, 4:B
Attempts:
2 left
💡 Hint
Think about what each threat tries to do: spread, trick, lock, or disguise.