Malware

Malware

University

7 Qs

quiz-placeholder

Similar activities

Teacher Camp 7/11

Teacher Camp 7/11

University

10 Qs

Cyber Security Quiz: Protect and Analyse

Cyber Security Quiz: Protect and Analyse

University

10 Qs

hacking

hacking

University

10 Qs

Understanding Malware and Social Engineering

Understanding Malware and Social Engineering

10th Grade - University

10 Qs

CyberSecurity

CyberSecurity

6th Grade - Professional Development

10 Qs

Siege One

Siege One

University

10 Qs

OBM255&ASM454: EMAIL

OBM255&ASM454: EMAIL

University

10 Qs

Chapter 1

Chapter 1

University

10 Qs

Malware

Malware

Assessment

Quiz

Computers

University

Medium

Created by

Hala Alqahtani

Used 11+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is malware?

Software that improves system performance

Software designed to infiltrate and harm systems

A legitimate application for cybersecurity

Software for managing data securely

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which malware type disguises itself as legitimate software?

Adware

Virus

Worm

Trojan Horse

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How does ransomware typically operate?

Gains administrative access to systems

Encrypts files and demands payment

Displays intrusive advertisements

Monitors user activity

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What method is used by attackers in phishing attacks?

Compromising USB drives

Injecting malicious ads into websites

Sending deceptive emails with malicious links

Exploiting software vulnerabilities

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which type of malware operates in system memory without leaving files on the hard drive?

Fileless malware

Spyware

Rootkits

Botnets

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the primary impact of a botnet?

Enabling large-scale attacks like DDoS

Displaying advertisements

Encrypting user files

Monitoring user behavior

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is one key prevention strategy against malware?

Downloading software from P2P networks

Using DNS spoofing

Avoiding software updates

Implementing two-factor authentication (2FA)