Malware Types

Malware Types

8th Grade

14 Qs

quiz-placeholder

Similar activities

Unit C Vocab Quiz

Unit C Vocab Quiz

6th - 8th Grade

11 Qs

A words - GCSE Computer Science

A words - GCSE Computer Science

1st - 10th Grade

13 Qs

Online Safety: CyberSecurity

Online Safety: CyberSecurity

6th - 12th Grade

16 Qs

KS3 Computing Quiz 2

KS3 Computing Quiz 2

6th - 8th Grade

10 Qs

computer security threats

computer security threats

8th Grade

16 Qs

Cyber Security KS4

Cyber Security KS4

8th - 12th Grade

15 Qs

Internet Security

Internet Security

3rd - 10th Grade

19 Qs

Data Security

Data Security

5th - 10th Grade

10 Qs

Malware Types

Malware Types

Assessment

Quiz

Computers

8th Grade

Hard

Created by

Hannah Charles

Used 26+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Operates under a command and control infrastructure where the zombie master (also known as the bot herder) can send remote commands to order the bots to perform actions. Is part of which malware?

Botnet

Spyware

Crimeware

Cryptomalware

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A [....] is a malware infected computer that allows remote software updates and control by a command and control center called a zombie master.

Trojan horse

Zombie

botnnet

Spyware

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Cryptomalware

is ransomware that encrypts files until a ransom is paid

is a scam to fool users into thinking they have some form of malware on their system. T

is a set of programs that allows attackers to maintain permanent administrator-level, hidden access to a computer.

refers to a group of zombie computers that are commanded from a central control infrastructure.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A rootkit is...

Is almost invisible software.

Resides below regular antivirus software detection.

Requires administrator privileges to install and maintains those privileges to allow subsequent access.

All the above

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

[....] is a self-replicating program.

Worm

Fileless virus

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Trojan horse is...

Relies on user decisions and actions to spread.

Does not need to be attached to a host file.

All the above

Often contains spying functions, such as a packet sniffer, or backdoor functions

that allow a computer to be remotely controlled from the network.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Fileless virus

uses legitimate programs to infect a computer. Because it doesn’t rely on files,

it leaves no footprint, making it undetectable by most antivirus, whitelisting, and other

traditional endpoint security solutions.

is software that is installed without the user's consent or knowledge. It is designed

to intercept or take partial control over the user's interaction with the computer.

is software that contains adware, installs toolbars, or has other unclear objectives

none

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?