Lesson 20 - Malware

Lesson 20 - Malware

University

8 Qs

quiz-placeholder

Similar activities

Basic Networking (Y8)

Basic Networking (Y8)

7th Grade - University

10 Qs

SecureMind Quiz

SecureMind Quiz

University

13 Qs

Cyberthreats

Cyberthreats

University

10 Qs

Malware&Phishing

Malware&Phishing

University

12 Qs

Quiz on Basics of Computer Security and SSH

Quiz on Basics of Computer Security and SSH

University

12 Qs

Quiz for computer virus-Teacher Mae

Quiz for computer virus-Teacher Mae

University

13 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Chapter 3 Quiz

Chapter 3 Quiz

University

11 Qs

Lesson 20 - Malware

Lesson 20 - Malware

Assessment

Quiz

Computers

University

Hard

Created by

Alejandro Gomez

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is able to replicate itself without human intervention required

Virus

Trojan

Worm

Backdoor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware requires infecting host programs to operate?

Virus

Backdoors

Trojans

Spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the type of malware that modifies the start of the binary to jump to the malicious code, and then return back to the normal execution flow?

Cavity malware

Overwriting malware

A

Appending malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the main goal of using a packer?

To perform social engineer attacks

To increase malware stability

To add an extra layer of code that's wrapped around a piece of malware to conceal it

To unpack the malware in memory

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What malware polymorphism is?

a type of malware that can disable the antivirus

a type of malware that is managed through a command and control server

a type of malware that is programmed to repeatedly mutate its appearance

None of the answers is correct

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the name of the technique used to load malicious code in an application once the antivirus has already checked it?

Static code replacement

Code injection

Dynamic code replacement

DLL hijacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's an exploit kit?

A trojan horse that infects windows systems

is a type of toolkit cybercriminals use to attack vulnerabilities in systems so they can distribute malware or perform other malicious activities

A kit created to bypass AV/EDR systems

A kit that allows to develop exploits to target operating systems

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a modern exploit kit?

Firepack

Neutrino

Fiesta

LuckySploit