Malware Types

Malware Types

8th Grade

14 Qs

quiz-placeholder

Similar activities

may tinh va chuong trinh may tinh

may tinh va chuong trinh may tinh

8th Grade

10 Qs

Networking Quiz

Networking Quiz

8th - 9th Grade

15 Qs

Arduino

Arduino

7th - 9th Grade

15 Qs

A számítógép felépítése

A számítógép felépítése

7th - 8th Grade

14 Qs

HARDWARE AND SOFTWARE

HARDWARE AND SOFTWARE

2nd - 10th Grade

10 Qs

EVOLUTION OF COMPUTERS

EVOLUTION OF COMPUTERS

4th - 8th Grade

16 Qs

Programming Lesson 3

Programming Lesson 3

6th - 8th Grade

12 Qs

Malware Types

Malware Types

Assessment

Quiz

Computers

8th Grade

Practice Problem

Hard

Created by

Hannah Charles

Used 33+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Operates under a command and control infrastructure where the zombie master (also known as the bot herder) can send remote commands to order the bots to perform actions. Is part of which malware?

Botnet

Spyware

Crimeware

Cryptomalware

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A [....] is a malware infected computer that allows remote software updates and control by a command and control center called a zombie master.

Trojan horse

Zombie

botnnet

Spyware

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Cryptomalware

is ransomware that encrypts files until a ransom is paid

is a scam to fool users into thinking they have some form of malware on their system. T

is a set of programs that allows attackers to maintain permanent administrator-level, hidden access to a computer.

refers to a group of zombie computers that are commanded from a central control infrastructure.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A rootkit is...

Is almost invisible software.

Resides below regular antivirus software detection.

Requires administrator privileges to install and maintains those privileges to allow subsequent access.

All the above

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

[....] is a self-replicating program.

Worm

Fileless virus

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Trojan horse is...

Relies on user decisions and actions to spread.

Does not need to be attached to a host file.

All the above

Often contains spying functions, such as a packet sniffer, or backdoor functions

that allow a computer to be remotely controlled from the network.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Fileless virus

uses legitimate programs to infect a computer. Because it doesn’t rely on files,

it leaves no footprint, making it undetectable by most antivirus, whitelisting, and other

traditional endpoint security solutions.

is software that is installed without the user's consent or knowledge. It is designed

to intercept or take partial control over the user's interaction with the computer.

is software that contains adware, installs toolbars, or has other unclear objectives

none

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers