
Malicious Wares
Authored by Sean Kelly
Computers
University
Used 13+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
13 questions
Show all answers
1.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Malware that pretends to be a legitimate program.
(a)
2.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Malware that modifies the core system files. Is typically invisible to the operating system.
(a)
3.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Malware that can reproduce itself through file systems or on a network to infect other devices.
(a)
4.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Malware that is used specifically to gather information by monitoring everything that happens on a user's system.
(a)
5.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Malware that will collect all of your keystrokes to log passwords, usernames, or banking information.
(a)
6.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Malware designed to consume a devices resources specifically for generating online currency.
(a)
7.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
Identify the step in the Malware removal process (1-7)
Identify and research malware symptoms
(a)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?