Search Header Logo

Quiz on 'perfctl' Fileless Malware

Authored by Mark Murphy

Computers

12th Grade

Used 1+ times

Quiz on 'perfctl' Fileless Malware
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary target of the 'perfctl' malware?

Android devices

MacOS servers

Linux servers

Windows servers

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware is 'perfctl' classified as?

Spyware

Ransomware

Adware

Fileless malware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which legitimate tool does 'perfctl' drop to find hardcoded secrets?

Metasploit

TruffleHog

Nmap

Wireshark

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is one of the main activities 'perfctl' engages in on compromised servers?

Phishing

Cryptomining

Spamming

Data encryption

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which vulnerability is mentioned as a method for 'perfctl' to gain initial access?

CVE-2023-33246

CVE-2020-6789

CVE-2021-4043

CVE-2022-12345

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What technique does 'perfctl' use to avoid detection?

Code obfuscation

Process masquerading

Data encryption

Network tunneling

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a recommended mitigation strategy against 'perfctl'?

Patch vulnerabilities

Use outdated software

Ignore security alerts

Disable all network connections

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?