14.7.2 - Malware Types Quiz

14.7.2 - Malware Types Quiz

10th Grade

15 Qs

quiz-placeholder

Similar activities

Malware

Malware

9th - 11th Grade

15 Qs

Computer Crime & Malware CW #1

Computer Crime & Malware CW #1

10th Grade

20 Qs

040_An Overview of Malware – CompTIA Security+ SY0-701

040_An Overview of Malware – CompTIA Security+ SY0-701

9th Grade - University

20 Qs

Cyber security

Cyber security

10th - 11th Grade

19 Qs

BTEC IT Unit 1 - D1 Threats to data

BTEC IT Unit 1 - D1 Threats to data

10th - 12th Grade

15 Qs

AQA GCSE Computer Science: Malware

AQA GCSE Computer Science: Malware

10th - 11th Grade

13 Qs

CS Edexcel 5.2a Malware and Social Engineering

CS Edexcel 5.2a Malware and Social Engineering

10th Grade

20 Qs

Computer Security

Computer Security

7th - 10th Grade

12 Qs

14.7.2 - Malware Types Quiz

14.7.2 - Malware Types Quiz

Assessment

Quiz

Computers

10th Grade

Easy

Created by

Brian Bass

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key characteristic of a virus?

It encrypts files for ransom.

It provides remote access to hackers.

It is self-replicating.

It logs keystrokes.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware type requires a legitimate program to attach itself to?

Virus

Ransomware

Trojan horse

Spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a boot sector virus do to the Master Boot Record (MBR)?

Replicates it

Deletes it

Encrypts it

Moves it to another location

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware type is known for providing covert remote access?

Rootkit

Cryptominer

Trojan horse

Keylogger

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common symptom of a Trojan horse infection?

Screen settings change by themselves

Files are encrypted

Web browsing activities are monitored

Computer overheats

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does a keylogger do?

Encrypts files

Logs every keystroke

Provides remote access

Uses computer resources to mine cryptocurrency

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware type is typically not destructive but extremely invasive?

Virus

Spyware

Ransomware

Rootkit

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?