040_An Overview of Malware – CompTIA Security+ SY0-701

040_An Overview of Malware – CompTIA Security+ SY0-701

9th Grade

25 Qs

quiz-placeholder

Similar activities

IC3: Computing Fundamentals

IC3: Computing Fundamentals

7th - 9th Grade

20 Qs

Ciberseguridad Conceptos basicos

Ciberseguridad Conceptos basicos

11th Grade

20 Qs

BTEC L3 U11 - Security Plan

BTEC L3 U11 - Security Plan

12th Grade

25 Qs

Q1M2 Test

Q1M2 Test

10th Grade

30 Qs

3ro Inf-Soporte Técnico

3ro Inf-Soporte Técnico

12th Grade

20 Qs

Kelas Xl TKJ - P2 (Kuis Keamanan Jaringan)

Kelas Xl TKJ - P2 (Kuis Keamanan Jaringan)

11th Grade

20 Qs

software

software

9th - 12th Grade

20 Qs

Identifying Security Threats

Identifying Security Threats

9th - 12th Grade

20 Qs

040_An Overview of Malware – CompTIA Security+ SY0-701

040_An Overview of Malware – CompTIA Security+ SY0-701

Assessment

Quiz

Computers

9th Grade

Hard

Created by

Grit and Motivation

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "malware" refer to?

A general term for any type of malicious software

A harmless system utility

Software developed by antivirus vendors

A type of file compression tool

An app used for data encryption only

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of malware?

A keylogger that captures and sends keystrokes

A cloud-based file backup service

A web browser extension for bookmarks

A password manager

A word processor

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Trojan Horse in cybersecurity?

Malware disguised as legitimate software

An advanced type of firewall

A form of password manager

A secure cloud storage protocol

A method of patch management

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware encrypts your files and demands payment?

Ransomware

Adware

Spyware

Bloatware

Logic bomb

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is used to secretly monitor and capture user activity?

Spyware

Worm

Firewall

Virtual machine

Sandbox

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a rootkit?

To provide hidden and persistent access to a system

To scan files for viruses

To back up user data

To generate pop-up ads

To secure wireless networks

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How do worms typically spread?

Across networks by exploiting vulnerabilities

Through manual USB installation

Only via user consent

By printing malicious documents

Via system updates

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?