Malware Types

Malware Types

Assessment

Assessment

Created by

Matt Thompson

11th - 12th Grade

13 plays

Hard

7 questions

Show all answers

1.

MULTIPLE CHOICE

45 sec • 1 pt

Karen downloaded a Word document from an email she received from a coworker. Now every document she prints on Mondays ends with the message "I hate Mondays!" People in Karen's Outlook contact list received the same message, but from her.


What type of malware infected Karen's computer?

2.

MULTIPLE CHOICE

45 sec • 1 pt

Lomez is a black hat hacker. He wrote a program that generated random IP addresses and then sent itself out to those IP addresses in hope that they weren't protected by antivirus software. After a short time, more than 50,000 computers were infected, which Lomez used to carry out DDoS attacks on major websites.


What type of malware did Lomez create?

3.

MULTIPLE CHOICE

45 sec • 1 pt

A program that records search and browsing histories, as well as keystrokes, is what type of malware?

4.

MULTIPLE CHOICE

45 sec • 1 pt

Penelope writes code for a power company. She inserted a line of code in a system that would kill power for hundreds of homes if she is ever fired from her job.


What type of malware did Penelope create?

5.

MULTIPLE CHOICE

45 sec • 1 pt

Lomez is a black hat hacker. He wrote a program that generated random IP addresses and then sent itself out to those IP addresses in hope that they weren't protected by antivirus software. After a short time, more than 50,000 computers were infected, which Lomez used to carry out DDoS attacks on major websites.


What did the infected computers become part of?

6.

MULTIPLE CHOICE

45 sec • 1 pt

Steve logged in to his computer and received a message that his data is locked and won't be accessible unless he pays $500.


What type of malware infected Steve's computer?

7.

MULTIPLE CHOICE

45 sec • 1 pt

What type of survelience technology that records keystrokes can be used by an employer to monitor employee activities, by parents to supervise children online, or by cybercriminals to steal PII?