Search Header Logo

Malware

Authored by Mark Lopez

Computers

Professional Development

Used 2+ times

Malware
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

What prevention strategies will you implement to mitigate ransomware risks?

Regular Updates

User Awareness

Back-up Date

Antivirus Software

2.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

What is that type of malware that monitors user's activity?

Trojan Horses

Adware

Ransomware

Spyware

3.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

A highly sophisticated worm discovered in 2010 intended for Iran's nuclear program is?

WannaCry

Stuxnet

NotPetya

Petya

4.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

One mitigation strategies that will minimize malware attack is divide your network into segments which is called?

Implementing VPN

Subnetting

Segmentation

Firewall

5.

MULTIPLE CHOICE QUESTION

10 sec • 5 pts

____________ is a detection and removal process that monitors abnormal system behaviour.

Scanning Tools

Incident Response

Internet Security

Behavioural Analysis

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?