Search Header Logo

CSF Additional Quiz - Chapter 3

Authored by Chin Siong Hong

Other

Professional Development

Used 1+ times

CSF Additional Quiz - Chapter 3
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term is used to describe software designed to disrupt computer operations or gain unauthorized access without the user's knowledge or permission?

Virus

Malware

Worm

Trojan horse

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do worms differ from viruses?

Worms require user initiation

Viruses can run independently

Worms always slow down networks

Viruses replicate by exploiting vulnerabilities

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main characteristic that distinguishes a Trojan horse from a virus?

Trojan horses infect executable files

Viruses require user initiation

Trojan horses bind to non-executable files

Viruses mutate to avoid detection

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware holds a computer system or its data captive until a payment is made?

Logic Bomb

Ransomware

Backdoor

Spyware

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a browser hijacker?

To modify system files

To alter browser settings for redirection

To encrypt data on the computer

To replicate independently over networks

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary objective of social engineering attacks?

To exploit software vulnerabilities

To gain unauthorized access through technical means

To manipulate individuals into divulging information or performing actions

To launch malware attacks on computer networks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is "pretexting" in the context of social engineering?

Requesting personal information in exchange for something

Lying to an individual to gain access to privileged data

Observing and picking up PINs through surveillance

Pretending to be a part of a large crowd to gain entry into a secure location

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?