Quiz on 'perfctl' Fileless Malware

Quiz on 'perfctl' Fileless Malware

12th Grade

10 Qs

quiz-placeholder

Similar activities

Internet and Networking Quiz

Internet and Networking Quiz

9th - 12th Grade

15 Qs

Understanding Server-Client Networking Quiz

Understanding Server-Client Networking Quiz

12th Grade

10 Qs

Cloud Storage

Cloud Storage

8th Grade - University

10 Qs

IT English Essentials: Unit 1 - Quiz 1

IT English Essentials: Unit 1 - Quiz 1

12th Grade

10 Qs

Digital Footprint

Digital Footprint

12th Grade

10 Qs

Computer Networking Quiz

Computer Networking Quiz

12th Grade

15 Qs

Cyber Security

Cyber Security

9th - 12th Grade

15 Qs

IT English Essentials: Unit 15 - Quiz 1

IT English Essentials: Unit 15 - Quiz 1

12th Grade

10 Qs

Quiz on 'perfctl' Fileless Malware

Quiz on 'perfctl' Fileless Malware

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Mark Murphy

Used 1+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary target of the 'perfctl' malware?

Android devices

MacOS servers

Linux servers

Windows servers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware is 'perfctl' classified as?

Spyware

Ransomware

Adware

Fileless malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which legitimate tool does 'perfctl' drop to find hardcoded secrets?

Metasploit

TruffleHog

Nmap

Wireshark

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the main activities 'perfctl' engages in on compromised servers?

Phishing

Cryptomining

Spamming

Data encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which vulnerability is mentioned as a method for 'perfctl' to gain initial access?

CVE-2023-33246

CVE-2020-6789

CVE-2021-4043

CVE-2022-12345

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What technique does 'perfctl' use to avoid detection?

Code obfuscation

Process masquerading

Data encryption

Network tunneling

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended mitigation strategy against 'perfctl'?

Patch vulnerabilities

Use outdated software

Ignore security alerts

Disable all network connections

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?

Discover more resources for Computers