Chapter 3 (fundamentals of Security)

Chapter 3 (fundamentals of Security)

University

10 Qs

quiz-placeholder

Similar activities

Basic Computer Trivia

Basic Computer Trivia

University

15 Qs

Common Windows Features

Common Windows Features

KG - University

12 Qs

Computer Basics and Terminology

Computer Basics and Terminology

University

10 Qs

Computer Virus Quiz Part 1

Computer Virus Quiz Part 1

University

9 Qs

hacking

hacking

University

10 Qs

Cyber Security Quiz: Protect and Analyse

Cyber Security Quiz: Protect and Analyse

University

10 Qs

Understanding Malware and Social Engineering

Understanding Malware and Social Engineering

10th Grade - University

10 Qs

QUIZ

QUIZ

University

10 Qs

Chapter 3 (fundamentals of Security)

Chapter 3 (fundamentals of Security)

Assessment

Quiz

Computers

University

Medium

Created by

Kelly Gafford

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware encrypts a user's files and demands a ransom to restore access?

Worm

Keylogger

Ransomware

Spyware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes cryptomalware?

A type of malware that displays pop-up ads on the screen.
A type of malware that encrypts files and demands a ransom for decryption.
A type of malware that slows down computer performance.
A type of malware that deletes files without encryption.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A __________ virus attaches itself to executable files and spreads when the infected file is executed.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a fileless virus typically operate?

A fileless virus operates by infecting physical files on the hard drive.
A fileless virus operates by residing in the computer's memory rather than on the hard drive.
A fileless virus operates by displaying pop-up messages on the screen.
A fileless virus operates by encrypting all files on the computer.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

__________ are self-replicating malware that spread independently over networks without the need for a host file.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is often used to form botnets?

Bots

Worm
Ransomware
Spyware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common characteristic of spyware?

Encrypts user files

Records user activity and gathers information without consent

Replicates itself and spreads across networks

Deletes files on specific dates

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?