43. Other Malware Types

43. Other Malware Types

Assessment

Interactive Video

Professional Development

Professional Development

Easy

Created by

Jennifer Clark

Used 1+ times

FREE Resource

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of information can keylogging software capture?

Only website URLs

Keystrokes, screenshots, and clipboard data

Only credit card information

Only passwords

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Dark Comet?

A type of antivirus software

A type of keylogging software

A type of logic bomb

A type of rootkit

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What triggers a logic bomb to activate?

A system reboot

A software update

A specific date and time or user action

An antivirus scan

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What happened during the logic bomb attack in South Korea in 2013?

All emails were deleted

All passwords were changed

ATMs were deleted and rebooted to no operating system

All bank accounts were hacked

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of secure boot in combating rootkits?

To update the antivirus software

To check the operating system's signature before booting

To delete all rootkits automatically

To encrypt all files on the system

Discover more resources for Professional Development