Search Header Logo
Malware and Social Engineering

Malware and Social Engineering

Assessment

Presentation

Computers

Professional Development

Medium

Created by

Julius Babalcon

Used 4+ times

FREE Resource

13 Slides • 10 Questions

1

Malware and Social Engineering

media

2

Multiple Choice

These are malicious software, or software designed to damage computers or computer networks, or to access information stored within a computer.

1

Operating System

2

Malware

3

Apps

3

media

4

Multiple Select

Malwares are typically distributed through (select all correct answers)

1

Drive-by download

2

Unsolicited email

3

Physical media

4

Self propagation

5

media

6

Multiple Choice

They attach themselves to clean files and infect other clean files. They can spread uncontrollably, damaging a system’s core functionality and deleting or corrupting files. They usually appear as an executable file (.exe).

1

Virus

2

Trojan

3

Spyware

4

Worms

7

media

8

Multiple Choice

This kind of malware disguises itself as legitimate software, or is hidden in legitimate software that has been tampered with. It tends to act discreetly and create backdoors in your security to let other malware in.

1

Spyware

2

Trojans

3

Worms

4

Ransomware

9

media

10

Multiple Choice

A type of malware that spreads copies of itself from computer to computer. It can replicate itself without any human interaction, and it does not need to attach itself to a software program in order to cause damage.

1

Spyware

2

Trojan

3

Worm

4

Ransomware

11

media

12

Multiple Choice

It hides in the background and takes notes on what you do online, including your passwords, credit card numbers, surfing habits, and more.

1

Spyware

2

Trojan

3

Worm

4

Ransomware

13

Multiple Choice

This kind of malware typically locks down your computer and your files, and threatens to erase everything unless you pay a ransom.

1

Spyware

2

Trojan

3

Worm

4

Ransomware

14

media

15

Multiple Choice

The science of using social interaction as a means to persuade an individual or an organization to comply with a specific request from an attacker where either the social interaction, the persuasion or the request involves a computer-related entity

1

Social Media

2

Social Engineering

3

Phishing

4

Smishing

16

Multiple Choice

The perpetrator typically sends an email to the target, seeking information that might help with a more significant crime.

1

Phishing

2

Vishing

3

Smishing

17

media

18

media

19

media

20

Multiple Choice

Oftentimes, this form of phishing involves a text message in an SMS or a phone number.

1

Phishing

2

Vishing

3

Smishing

21

media

22

media

23

media

Malware and Social Engineering

media

Show answer

Auto Play

Slide 1 / 23

SLIDE