Search Header Logo

Malicious Wares

Authored by Sean Kelly

Computers

University

Used 12+ times

Malicious Wares
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

13 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Malware that pretends to be a legitimate program.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Malware that modifies the core system files. Is typically invisible to the operating system.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Malware that can reproduce itself through file systems or on a network to infect other devices.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Malware that is used specifically to gather information by monitoring everything that happens on a user's system.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Malware that will collect all of your keystrokes to log passwords, usernames, or banking information.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Malware designed to consume a devices resources specifically for generating online currency.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Identify the step in the Malware removal process (1-7)

Identify and research malware symptoms

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?