Quiz 1 - Malicious Software

Quiz 1 - Malicious Software

University

14 Qs

quiz-placeholder

Similar activities

S8-S10 : After UTS - IS Security for LA11/LA26  Even 2022/2023

S8-S10 : After UTS - IS Security for LA11/LA26 Even 2022/2023

University

15 Qs

IDS IPS

IDS IPS

University

18 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

18 Qs

Chapter 4

Chapter 4

University

10 Qs

Knowing Yourself & Enemy

Knowing Yourself & Enemy

University

19 Qs

Cross-Site Scripting

Cross-Site Scripting

University

10 Qs

Cross Site Scripting

Cross Site Scripting

University

10 Qs

Red Team Vs. Blue Team

Red Team Vs. Blue Team

10th Grade - University

10 Qs

Quiz 1 - Malicious Software

Quiz 1 - Malicious Software

Assessment

Quiz

Computers

University

Hard

Created by

Ovidiu Stan

Used 32+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the CIA Triad, "Confidentiality" means ensuring that data is:

available and that people can access it

not accessible by unwanted parties

accessible anonymously

accurate and was not tampered with

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the CIA Triad, "Integrity" means ensuring that data is:

available and that people can access it

not accessible by unwanted parties

trhuthful and honest

accurate and was not tampered with

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In the CIA Triad, "Availability" means ensuring that data is:

available to anyone from anywhere

not accessible by unwanted parties

available and people can access it

accurate and was not tampered with

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the relationship between a vulnerability and an exploit?

An exploit takes advantages of a vulnerability to run arbitrary code or gain access

A vulnerability takes advantages of an exploit to run arbitrary code or gain access

They're unrelated

An exploit creates a vulnerability in a system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement is true for both a worm and a virus?

They don't cause any harm to the target system.

They're self-replicating and self-propagating.

They're undetectable by antimalware software.

They infect other files with malicious code.

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Check all examples of types of malware:

Adware

Worms

Key Generators

Viruses

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are the characteristics of a rootkit? Check all that apply.

Provides elevated credentials

Is harmless

is difficult to detect

Is destructive

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?