Lesson 13

Lesson 13

University

30 Qs

quiz-placeholder

Similar activities

IT Act 2000

IT Act 2000

University

30 Qs

Touhou Lost Word Quiz

Touhou Lost Word Quiz

7th Grade - Professional Development

25 Qs

BAB 6: INTERNET, RANGKAIAN DAN KESELAMATAN

BAB 6: INTERNET, RANGKAIAN DAN KESELAMATAN

University

25 Qs

Star Wars

Star Wars

4th Grade - University

25 Qs

Revision

Revision

University

28 Qs

class-2

class-2

University

31 Qs

Word Stem 18

Word Stem 18

7th Grade - University

25 Qs

Câu hỏi về giao thức mạng

Câu hỏi về giao thức mạng

University

33 Qs

Lesson 13

Lesson 13

Assessment

Quiz

Other

University

Medium

Created by

Benjamin Fenton

Used 4+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which vector-based malware type hides inside an otherwise legitimate installer package?

Worm

Trojan

Fileless malware

Logic bomb

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A virus that executes when a computer boots from an infected USB drive is classified as which virus type?

Memory-resident

Script/macro

Boot sector

Multipartite

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which behavior best characterizes fileless malware?

Encrypts user files for ransom

Persists entirely in system memory and uses PowerShell commands

Infects executable files on disk

Mass-mails copies of itself through email

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Capturing keystrokes to steal passwords is the primary purpose of which malware payload?

Rootkit

Keylogger

Adware

Crypto-miner

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A security team detects outbound connections from several hosts to an IRC server on port 6667. What is the MOST likely explanation?

Legitimate file transfer

Botnet command-and-control traffic

SYN flood generation

DNS tunneling

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which indicator most strongly suggests ransomware has executed on a workstation?

Browser homepage changed without user input

High CPU utilization and elevated fan speed

Numerous files suddenly renamed with a new extension and become inaccessible

Repeated logon failures in the security log

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During malware triage, analysts place a suspicious executable in an isolated VM to observe changes. This technique is called:

Threat hunting

Sheep-dip analysis

Credential dumping

Live forensics

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?