Search Header Logo

Malware/ IOC

Authored by Jose-__-CHINGON Jose-__-CHINGON

Instructional Technology

10th Grade - Professional Development

Used 34+ times

Malware/ IOC
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Malware?

Software that has been designed for some nefarious purpose

Pieces of code that attempt to penetrate networks and computer systems

Piece of software that performs some task under the control of another program;

Piece of malicious code that replicates by attaching itself to another piece of executable code

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Virus?

Piece of malicious code that replicates by attaching itself to another piece of executable code.

Software that has been designed for some nefarious purpose

Piece of software that appears to do one thing but hides other functions

Form of malware that is specifically designed to modify the operation of the operating system in some fashion to make it not work like its supposed to

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Polymorphic Malware?

Malware that can change its code after each use

Encrypts files and sells a decryption key to unlock the files

Piece of software that appears to do one thing but hides other functions

Piece of software that logs all of the keystrokes that a user enters

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Ransomware?

Encrypts files and sells a decryption key to unlock the files

Pieces of code that attempt to penetrate networks and computer systems

Software that monitors on users, recording and reporting on their activities

Supported by ads

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Worm?

Pieces of code that attempt to penetrate networks and computer systems and is able to move freely

Pieces of code that attempt to penetrate networks and computer systems and attaches itself to files

Piece of software that appears to do one thing but hides other functions

Piece of software that logs all of the keystrokes that a user enters

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Trojan?

Piece of software that appears to do one thing but hides other functions

Encrypts files and sells a decryption key to unlock the files

Piece of malicious code that replicates by attaching itself to another piece of executable code

Software that monitors on users, recording and reporting on their activities

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a Rootkit?

Form of malware that is specifically designed to modify the operation of the operating system in some fashion to make it not work like its supposed to

Piece of software that logs all of the keystrokes that a user enters

Software that monitors on users, recording and reporting on their activities

Piece of software that performs some task under the control of another program

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?