Quiz 1 - Malicious Software

Quiz 1 - Malicious Software

University

14 Qs

quiz-placeholder

Similar activities

Week 10 - Cyber Attacks Exercise 2

Week 10 - Cyber Attacks Exercise 2

University

10 Qs

Lesson 2 - Passing Data to Subsystems

Lesson 2 - Passing Data to Subsystems

University

10 Qs

ITE-13-Quiz-02

ITE-13-Quiz-02

University

10 Qs

ITBP301_Chapter 07

ITBP301_Chapter 07

University

10 Qs

Cyber Threats

Cyber Threats

9th Grade - University

14 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

Cybersecurity Final Round

Cybersecurity Final Round

University

10 Qs

Networks and Computer Attacks

Networks and Computer Attacks

University

15 Qs

Quiz 1 - Malicious Software

Quiz 1 - Malicious Software

Assessment

Quiz

Computers

University

Hard

Created by

Ovidiu Stan

Used 32+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the CIA Triad, "Confidentiality" means ensuring that data is:

available and that people can access it

not accessible by unwanted parties

accessible anonymously

accurate and was not tampered with

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the CIA Triad, "Integrity" means ensuring that data is:

available and that people can access it

not accessible by unwanted parties

trhuthful and honest

accurate and was not tampered with

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the CIA Triad, "Availability" means ensuring that data is:

available to anyone from anywhere

not accessible by unwanted parties

available and people can access it

accurate and was not tampered with

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the relationship between a vulnerability and an exploit?

An exploit takes advantages of a vulnerability to run arbitrary code or gain access

A vulnerability takes advantages of an exploit to run arbitrary code or gain access

They're unrelated

An exploit creates a vulnerability in a system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement is true for both a worm and a virus?

They don't cause any harm to the target system.

They're self-replicating and self-propagating.

They're undetectable by antimalware software.

They infect other files with malicious code.

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Check all examples of types of malware:

Adware

Worms

Key Generators

Viruses

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the characteristics of a rootkit? Check all that apply.

Provides elevated credentials

Is harmless

is difficult to detect

Is destructive

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?