Malware Types

Malware Types

8th Grade

14 Qs

quiz-placeholder

Similar activities

Tecnología, procesos, productos, sistemas, servicios 8º

Tecnología, procesos, productos, sistemas, servicios 8º

8th Grade

11 Qs

Impresa e siti web

Impresa e siti web

8th - 12th Grade

10 Qs

Computer System

Computer System

8th - 9th Grade

10 Qs

APPS FOR GOOD - END OF TOPIC TEST

APPS FOR GOOD - END OF TOPIC TEST

7th - 8th Grade

12 Qs

EXCEL SỬ DỤNG CÁC HÀM

EXCEL SỬ DỤNG CÁC HÀM

7th - 9th Grade

16 Qs

Coding Quiz

Coding Quiz

6th - 10th Grade

15 Qs

Actúa - Conocimientos generales

Actúa - Conocimientos generales

2nd Grade - Professional Development

15 Qs

Quiz: Programming a Calculator. Part 1 and Part 2 Review

Quiz: Programming a Calculator. Part 1 and Part 2 Review

7th - 8th Grade

17 Qs

Malware Types

Malware Types

Assessment

Quiz

Computers

8th Grade

Practice Problem

Hard

Created by

Hannah Charles

Used 33+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Operates under a command and control infrastructure where the zombie master (also known as the bot herder) can send remote commands to order the bots to perform actions. Is part of which malware?

Botnet

Spyware

Crimeware

Cryptomalware

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A [....] is a malware infected computer that allows remote software updates and control by a command and control center called a zombie master.

Trojan horse

Zombie

botnnet

Spyware

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Cryptomalware

is ransomware that encrypts files until a ransom is paid

is a scam to fool users into thinking they have some form of malware on their system. T

is a set of programs that allows attackers to maintain permanent administrator-level, hidden access to a computer.

refers to a group of zombie computers that are commanded from a central control infrastructure.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

A rootkit is...

Is almost invisible software.

Resides below regular antivirus software detection.

Requires administrator privileges to install and maintains those privileges to allow subsequent access.

All the above

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

[....] is a self-replicating program.

Worm

Fileless virus

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Trojan horse is...

Relies on user decisions and actions to spread.

Does not need to be attached to a host file.

All the above

Often contains spying functions, such as a packet sniffer, or backdoor functions

that allow a computer to be remotely controlled from the network.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Media Image

Fileless virus

uses legitimate programs to infect a computer. Because it doesn’t rely on files,

it leaves no footprint, making it undetectable by most antivirus, whitelisting, and other

traditional endpoint security solutions.

is software that is installed without the user's consent or knowledge. It is designed

to intercept or take partial control over the user's interaction with the computer.

is software that contains adware, installs toolbars, or has other unclear objectives

none

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?