CNET151 Chapt 5 Malware -5th Ed

CNET151 Chapt 5 Malware -5th Ed

12th Grade

10 Qs

quiz-placeholder

Similar activities

Malware, CyberSecurity Life cycle, and CIA Triad

Malware, CyberSecurity Life cycle, and CIA Triad

Understanding Computer Viruses and Internet Security

Understanding Computer Viruses and Internet Security

A+ - 17C - Troubleshoot Workstation Security Issues

A+ - 17C - Troubleshoot Workstation Security Issues

Malware Types

Malware Types

Cyber Security

Cyber Security

Cybersecurity Quiz 3

Cybersecurity Quiz 3

Computer viruses

Computer viruses

CNET151 Chapt 5 Malware -5th Ed

CNET151 Chapt 5 Malware -5th Ed

Assessment

Quiz

Computers

12th Grade

Easy

Created by

Karen Diggs

Used 25+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A common way for a virus to spread is by __________.

Scanning your computer for network connections and copying itself to other machines on the network

Installing security software

Locating Linux machines

Using a buffer-overflow attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Microsoft Office suite is a tempting target for viruses because __________.

It is so ubiquitous

It is designed so that legitimate programmers can access its internal objects

It contains virus programming tools

It copies virus files faster

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Shlayer virus caused harm because __________.

It had a negative payload

It erased data on computers

It installed a variety of malicious programs

It attempted to identify and sell personal or financial data

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of virus uses techniques that make it hard to analyze, such as code confusion?

Armored

Multi-partite

Boot sector

Polymorphic

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of virus attempts to elude detection by performing its malicious activities only sporadically?

Memory resident

Sparse infector

Armored

Boot sector

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which virus was known as Mimail?

Mimail

Kedi RAT

Sobig

Petya

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which virus was specifically designed by the U.S. government for espionage?

Nonvirus

Schlayer

Flame

FakeAV

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?