Rootkit Quiz

Rootkit Quiz

Professional Development

8 Qs

quiz-placeholder

Similar activities

Earthing & Lightning Protection

Earthing & Lightning Protection

Professional Development

8 Qs

S | M03 Assignment 1'

S | M03 Assignment 1'

Professional Development

12 Qs

19.4

19.4

University - Professional Development

10 Qs

OYMS Training

OYMS Training

Professional Development

10 Qs

Managing Projects

Managing Projects

Professional Development

10 Qs

Brakes 3

Brakes 3

Professional Development

10 Qs

TRIZ Level 1_Part 2

TRIZ Level 1_Part 2

Professional Development

10 Qs

Systems, Procedures, and Behavior Quiz

Systems, Procedures, and Behavior Quiz

Professional Development

11 Qs

Rootkit Quiz

Rootkit Quiz

Assessment

Quiz

Professional Development

Professional Development

Easy

Created by

Airi Pilt

Used 25+ times

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of behavior might indicate the presence of a rootkit?

Faster system performance

Strange or suspicious computer behavior noticed by a computer administrator

Increased storage space

Automatic software updates

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

When was the first recorded rootkit created?

1980

1990

2000

2010

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of a rootkit?

To improve system performance

To infiltrate a computer system and conceal its presence

To backup data

To remove viruses

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some legitimate purposes of rootkits?

To play games

To enable remote monitoring and control of a computer system by employers, parents, or law enforcement officials

To delete files

To increase system speed

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a method that might help in detecting rootkits?

Using standard antivirus software

Scanning memory and file systems for indicators

Regularly updating software

Defragmenting the hard drive

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do rootkits typically conceal their presence?

By displaying warning messages

By concealing files, processes, connections, and registry entries from other programs

By shutting down the computer

By deleting important files

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What was a precursor to rootkits used for at Bell Labs?

To improve system performance

To gain access to computers in a naval lab in California

To backup data

To remove viruses

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What kind of information can rootkits be used to find?

Software updates

Log-in information, user names, and passwords

System updates

System errors

Discover more resources for Professional Development