Level 5 - Malware Quiz

Level 5 - Malware Quiz

10 Qs

quiz-placeholder

Similar activities

Quiz on Cyber Crimes & Security

Quiz on Cyber Crimes & Security

KG - University

6 Qs

Cyber Security Vocabulary (Set 3)

Cyber Security Vocabulary (Set 3)

KG - University

10 Qs

The Iliad Books 6-10

The Iliad Books 6-10

9th - 12th Grade

10 Qs

Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

KG - University

15 Qs

L17 Quiz - Disaster Recovery

L17 Quiz - Disaster Recovery

KG - University

8 Qs

q2 L23 Quiz - Intellectual Property & Criminal Use

q2 L23 Quiz - Intellectual Property & Criminal Use

KG - University

11 Qs

Simulacro de ETR

Simulacro de ETR

KG - University

9 Qs

d6 6-1 Hardware & Software - GCSE Quiz

d6 6-1 Hardware & Software - GCSE Quiz

KG - University

6 Qs

Level 5 - Malware Quiz

Level 5 - Malware Quiz

Assessment

Quiz

others

Hard

Created by

Eric Jones

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware type uses legitimate programs to infect a computer, operating in memory, and doesn't rely on files?
A) Trojan horse
B) Worm
C) Fileless virus
D) Rootkit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware type can self-replicate and spread across computer networks without any user assistance?
A) Worm
B) Fileless virus
C) Trojan horse
D) Rootkit

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious program that disguises itself as legitimate or desirable software and often contains spying functions is known as a:
A) Rootkit
B) Trojan horse
C) Fileless virus
D) Worm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware allows remote software updates and control by a command and control center called a zombie master?
A) Trojan horse
B) Fileless virus
C) Zombie
D) Botnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of zombie computers commanded from a central control infrastructure is known as a:
A) Zombie
B) Trojan horse
C) Botnet
D) Rootkit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of programs that allows attackers to maintain permanent administrator-level, hidden access to a computer is known as a:
A) Fileless virus
B) Botnet
C) Zombie
D) Rootkit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This software is designed to intercept or take partial control over the user's interaction with the computer and is installed without the user's consent or knowledge:
A) Fileless virus
B) Spyware
C) Worm
D) Trojan horse

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?