Malware Types

Malware Types

8th Grade

14 Qs

quiz-placeholder

Similar activities

Microbit Features Activity

Microbit Features Activity

6th - 8th Grade

9 Qs

Input, output and storage de

Input, output and storage de

8th Grade - Professional Development

14 Qs

HTML Öğreniyorum!

HTML Öğreniyorum!

8th Grade

10 Qs

Cos’è la ROM?

Cos’è la ROM?

6th - 12th Grade

10 Qs

7.02 going online

7.02 going online

4th - 9th Grade

10 Qs

Revision 8

Revision 8

5th - 8th Grade

18 Qs

hardware and software(g3)

hardware and software(g3)

2nd - 10th Grade

10 Qs

Adivina quien?

Adivina quien?

1st - 10th Grade

15 Qs

Malware Types

Malware Types

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Hannah Charles

Used 32+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Operates under a command and control infrastructure where the zombie master (also known as the bot herder) can send remote commands to order the bots to perform actions. Is part of which malware?

Botnet

Spyware

Crimeware

Cryptomalware

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A [....] is a malware infected computer that allows remote software updates and control by a command and control center called a zombie master.

Trojan horse

Zombie

botnnet

Spyware

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Cryptomalware

is ransomware that encrypts files until a ransom is paid

is a scam to fool users into thinking they have some form of malware on their system. T

is a set of programs that allows attackers to maintain permanent administrator-level, hidden access to a computer.

refers to a group of zombie computers that are commanded from a central control infrastructure.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A rootkit is...

Is almost invisible software.

Resides below regular antivirus software detection.

Requires administrator privileges to install and maintains those privileges to allow subsequent access.

All the above

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

[....] is a self-replicating program.

Worm

Fileless virus

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Trojan horse is...

Relies on user decisions and actions to spread.

Does not need to be attached to a host file.

All the above

Often contains spying functions, such as a packet sniffer, or backdoor functions

that allow a computer to be remotely controlled from the network.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Fileless virus

uses legitimate programs to infect a computer. Because it doesn’t rely on files,

it leaves no footprint, making it undetectable by most antivirus, whitelisting, and other

traditional endpoint security solutions.

is software that is installed without the user's consent or knowledge. It is designed

to intercept or take partial control over the user's interaction with the computer.

is software that contains adware, installs toolbars, or has other unclear objectives

none

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?

Discover more resources for Computers