Level 5 - Malware Quiz

Level 5 - Malware Quiz

10 Qs

quiz-placeholder

Similar activities

Jaringan Komputer dan Internet Kelas 8

Jaringan Komputer dan Internet Kelas 8

KG - University

11 Qs

LECTURA: ESCRITURA 8VO

LECTURA: ESCRITURA 8VO

KG - University

10 Qs

Career Advice on becoming a Beauty Therapist by Danielle S (Full Version)

Career Advice on becoming a Beauty Therapist by Danielle S (Full Version)

KG - University

10 Qs

Up to Multi-Step Word Problems

Up to Multi-Step Word Problems

KG - University

10 Qs

Batallas 1

Batallas 1

6th Grade

8 Qs

Teszt 15-21

Teszt 15-21

Professional Development

7 Qs

Level 5 - Malware Quiz

Level 5 - Malware Quiz

Assessment

Quiz

others

Practice Problem

Hard

Created by

Eric Jones

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware type uses legitimate programs to infect a computer, operating in memory, and doesn't rely on files?

A) Trojan horse
B) Worm
C) Fileless virus
D) Rootkit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware type can self-replicate and spread across computer networks without any user assistance?

A) Worm
B) Fileless virus
C) Trojan horse
D) Rootkit

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious program that disguises itself as legitimate or desirable software and often contains spying functions is known as a:

A) Rootkit
B) Trojan horse
C) Fileless virus
D) Worm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware allows remote software updates and control by a command and control center called a zombie master?

A) Trojan horse
B) Fileless virus
C) Zombie
D) Botnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of zombie computers commanded from a central control infrastructure is known as a:

A) Zombie
B) Trojan horse
C) Botnet
D) Rootkit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of programs that allows attackers to maintain permanent administrator-level, hidden access to a computer is known as a:

A) Fileless virus
B) Botnet
C) Zombie
D) Rootkit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This software is designed to intercept or take partial control over the user's interaction with the computer and is installed without the user's consent or knowledge:

A) Fileless virus
B) Spyware
C) Worm
D) Trojan horse

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?