Search Header Logo

Malware (CompTIA 1)

Authored by Andell Haughton

Computers

Professional Development

Used 4+ times

Malware (CompTIA 1)
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a computer virus infect a pc?

Email attachments
Attached to files on memory sticks
Suspicious web links
All of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can a trojan infect your pc?

On memory sticks.
Through email attachments.
By being disguised as legitimate software.
Dodgy web links

3.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following answers refer to the characteristic features of an advertising-supported software? (Select 2 answers)

Unsolicited or undesired electronic messages

Advertisements embedded in a computer application

A type of software commonly referred to as malware

Malicious program that sends copies of itself to other computers on the network

A type of software commonly referred to as adware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A computer program containing malicious segment that attaches itself to an application program or other executable component is called:

Adware

Spam

Virus

Flash cookie

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In computer security, the part of malware code responsible for performing malicious action is referred to as:

Payload

Frame

Exploit

Logic bomb

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Malicious software collecting information about users without their knowledge/consent is known as:

Trojan

Backdoor

Virus

Adware

Spyware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The term "companion virus" refers to an older type of computer virus which doesn't alter files and works by creating infected companion file with the exact same name as the legitimate program, but with different file extension. The virus takes advantage of the fact that in the old MS-DOS command-line interface executables can be run by providing only the file name which facilitates the execution of infected code by an unaware user.

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?