Operates under a command and control infrastructure where the zombie master (also known as the bot herder) can send remote commands to order the bots to perform actions. Is part of which malware?
Malware Types

Quiz
•
Computers
•
8th Grade
•
Hard
Hannah Charles
Used 26+ times
FREE Resource
14 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Botnet
Spyware
Crimeware
Cryptomalware
2.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A [....] is a malware infected computer that allows remote software updates and control by a command and control center called a zombie master.
Trojan horse
Zombie
botnnet
Spyware
3.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Cryptomalware
is ransomware that encrypts files until a ransom is paid
is a scam to fool users into thinking they have some form of malware on their system. T
is a set of programs that allows attackers to maintain permanent administrator-level, hidden access to a computer.
refers to a group of zombie computers that are commanded from a central control infrastructure.
4.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
A rootkit is...
Is almost invisible software.
Resides below regular antivirus software detection.
Requires administrator privileges to install and maintains those privileges to allow subsequent access.
All the above
5.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
[....] is a self-replicating program.
Worm
Fileless virus
6.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Trojan horse is...
Relies on user decisions and actions to spread.
Does not need to be attached to a host file.
All the above
Often contains spying functions, such as a packet sniffer, or backdoor functions
that allow a computer to be remotely controlled from the network.
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
Fileless virus
uses legitimate programs to infect a computer. Because it doesn’t rely on files,
it leaves no footprint, making it undetectable by most antivirus, whitelisting, and other
traditional endpoint security solutions.
is software that is installed without the user's consent or knowledge. It is designed
to intercept or take partial control over the user's interaction with the computer.
is software that contains adware, installs toolbars, or has other unclear objectives
none
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Cyber Security

Quiz
•
8th - 12th Grade
9 questions
Malware

Quiz
•
7th - 11th Grade
11 questions
Online Safety

Quiz
•
6th - 12th Grade
10 questions
Virus and Anti-Virus

Quiz
•
8th Grade
15 questions
Hackers and Malware

Quiz
•
8th Grade
15 questions
Year 9 - Cybersecurity

Quiz
•
6th - 8th Grade
10 questions
Y8 Computer crime 2

Quiz
•
7th - 9th Grade
15 questions
IT Security & Encryption of Data

Quiz
•
8th - 10th Grade
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
Discover more resources for Computers
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade
17 questions
Parts of Speech

Quiz
•
7th - 12th Grade
10 questions
Identifying equations

Quiz
•
KG - University
44 questions
El fin del año- 7th

Quiz
•
7th - 12th Grade
40 questions
Word Study Assessment: Roots, Prefixes, Suffixes, and Vocabulary

Quiz
•
8th Grade
17 questions
guess the logo

Quiz
•
8th Grade
16 questions
Function or Non-Function?

Quiz
•
8th - 10th Grade
15 questions
Sentence Fragments and Run-ons

Quiz
•
8th Grade