Revision for Chapter 3

Revision for Chapter 3

University

24 Qs

quiz-placeholder

Similar activities

Network and Internet Security

Network and Internet Security

University

20 Qs

Gettin' Hacked is Wack

Gettin' Hacked is Wack

6th Grade - University

19 Qs

Cybersecurity Exam 2 Review

Cybersecurity Exam 2 Review

University

22 Qs

Week 15 - Module 5 Unit 2 Using Best Practice

Week 15 - Module 5 Unit 2 Using Best Practice

University

20 Qs

The Digital Knowledge Check

The Digital Knowledge Check

University

25 Qs

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

024_Watering Hole Attacks – CompTIA Security+ SY0-701 – 2.2

9th Grade - University

20 Qs

3A-DDC313-SW5

3A-DDC313-SW5

University

20 Qs

Revision for Chapter 3

Revision for Chapter 3

Assessment

Quiz

Computers

University

Hard

Created by

Kevin Wong

Used 1+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the types of malware?

Viruses - Melissa Virus

Worms - Code Red Worm

Trojan horse,

Logic bomb

Ransomware

Backdoors and Rootkits

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Describe one malware that requires user's intervention

Answer explanation

Media Image

Most viruses require end-user initiation, and can activate at a specific time or date

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Explain the first characteristics of malware in computer systems.

Answer explanation

Disrupt computer operations without the user's knowledge or permission

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Explain the second characteristics of malware in computer systems.

Answer explanation

Gain Access to computer systems, without the user's knowledge or permission

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Describe one malware that does not require user participation

Answer explanation

Worms no longer require user participation

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A malware silently carries out malicious operations

while Peter plays an online game. What malware is that?

Answer explanation

Media Image

A Trojan horse is malware that carries out malicious operations under the guise of a desired operation such as playing an online game.

This malicious code exploits the privileges of the user that runs it. A trojan horse differs from a virus because the Trojan binds itself to non-executable files, such as image files, audio files, or games.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Four triggers that could awaken a malicious program like Logic Bomb are

date

time

programs running

delete user account

Answer explanation

A malicious program that uses a trigger to awaken the malicious code.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?