Rootkit Quiz

Rootkit Quiz

Professional Development

8 Qs

quiz-placeholder

Similar activities

Product Workshop - Day 1

Product Workshop - Day 1

Professional Development

13 Qs

Review Class 11

Review Class 11

Professional Development

7 Qs

ICNA HACKATHON 2

ICNA HACKATHON 2

Professional Development

11 Qs

Trial 2

Trial 2

Professional Development

6 Qs

End of term quiz July 2021

End of term quiz July 2021

Professional Development

10 Qs

I guess its aye plus

I guess its aye plus

Professional Development

10 Qs

More Mama Boards

More Mama Boards

Professional Development

10 Qs

questions for people

questions for people

Professional Development

10 Qs

Rootkit Quiz

Rootkit Quiz

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Airi Pilt

Used 25+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of behavior might indicate the presence of a rootkit?

Faster system performance

Strange or suspicious computer behavior noticed by a computer administrator

Increased storage space

Automatic software updates

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When was the first recorded rootkit created?

1980

1990

2000

2010

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of a rootkit?

To improve system performance

To infiltrate a computer system and conceal its presence

To backup data

To remove viruses

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some legitimate purposes of rootkits?

To play games

To enable remote monitoring and control of a computer system by employers, parents, or law enforcement officials

To delete files

To increase system speed

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a method that might help in detecting rootkits?

Using standard antivirus software

Scanning memory and file systems for indicators

Regularly updating software

Defragmenting the hard drive

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do rootkits typically conceal their presence?

By displaying warning messages

By concealing files, processes, connections, and registry entries from other programs

By shutting down the computer

By deleting important files

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was a precursor to rootkits used for at Bell Labs?

To improve system performance

To gain access to computers in a naval lab in California

To backup data

To remove viruses

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of information can rootkits be used to find?

Software updates

Log-in information, user names, and passwords

System updates

System errors