Malware Types
Quiz
•
Computers
•
8th Grade
•
Practice Problem
•
Hard
Hannah Charles
Used 33+ times
FREE Resource
Enhance your content in a minute
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Operates under a command and control infrastructure where the zombie master (also known as the bot herder) can send remote commands to order the bots to perform actions. Is part of which malware?
Botnet
Spyware
Crimeware
Cryptomalware
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A [....] is a malware infected computer that allows remote software updates and control by a command and control center called a zombie master.
Trojan horse
Zombie
botnnet
Spyware
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Cryptomalware
is ransomware that encrypts files until a ransom is paid
is a scam to fool users into thinking they have some form of malware on their system. T
is a set of programs that allows attackers to maintain permanent administrator-level, hidden access to a computer.
refers to a group of zombie computers that are commanded from a central control infrastructure.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A rootkit is...
Is almost invisible software.
Resides below regular antivirus software detection.
Requires administrator privileges to install and maintains those privileges to allow subsequent access.
All the above
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
[....] is a self-replicating program.
Worm
Fileless virus
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Trojan horse is...
Relies on user decisions and actions to spread.
Does not need to be attached to a host file.
All the above
Often contains spying functions, such as a packet sniffer, or backdoor functions
that allow a computer to be remotely controlled from the network.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Fileless virus
uses legitimate programs to infect a computer. Because it doesn’t rely on files,
it leaves no footprint, making it undetectable by most antivirus, whitelisting, and other
traditional endpoint security solutions.
is software that is installed without the user's consent or knowledge. It is designed
to intercept or take partial control over the user's interaction with the computer.
is software that contains adware, installs toolbars, or has other unclear objectives
none
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Cyber Security
Quiz
•
1st - 10th Grade
16 questions
Acceptable Use Policy
Quiz
•
6th - 9th Grade
14 questions
BÀI 14- THUẬT TOÁN TÌM KIẾM TUẦN TỰ
Quiz
•
6th Grade - University
10 questions
Grade 8
Quiz
•
8th Grade
13 questions
5.3. Запис математичних виразів на мові Python
Quiz
•
8th Grade
13 questions
Spreadsheets
Quiz
•
6th - 8th Grade
10 questions
BÀI 8. SẮP XẾP VÀ LỌC DỮ LIỆU
Quiz
•
1st - 12th Grade
10 questions
Recuperação Pensamento Computacional 2º semestre
Quiz
•
8th Grade
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
11 questions
How well do you know your Christmas Characters?
Lesson
•
3rd Grade
14 questions
Christmas Trivia
Quiz
•
5th Grade
20 questions
How the Grinch Stole Christmas
Quiz
•
5th Grade
