UIT 2221 MALWARE (COPTPA)

UIT 2221 MALWARE (COPTPA)

University

15 Qs

quiz-placeholder

Similar activities

Understanding Trojans in Computer Security

Understanding Trojans in Computer Security

12th Grade - University

17 Qs

Computer Security Risk

Computer Security Risk

11th Grade - University

16 Qs

Cybersecurity

Cybersecurity

10th Grade - University

20 Qs

Keamanan1 Siber SI

Keamanan1 Siber SI

University

20 Qs

Types of Computer Virus

Types of Computer Virus

University

10 Qs

Chapter 4 Viruses

Chapter 4 Viruses

University

10 Qs

Cyber Security

Cyber Security

5th Grade - Professional Development

20 Qs

Malware&Phishing

Malware&Phishing

University

12 Qs

UIT 2221 MALWARE (COPTPA)

UIT 2221 MALWARE (COPTPA)

Assessment

Quiz

Computers

University

Hard

Created by

CHE (IKBN-KEMASIK)

Used 7+ times

FREE Resource

15 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

This virus targets and alters your browser setting. It is often called a browser redirect virus because it redirects your browser to other malicious websites that you don’t have any intention of visiting.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A script is a programming code embedded in an application that instructs a program on how to perform. In order to provide a multimedia content, these webpages execute complex codes.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A virus that attached itself to an executable program. It is also called a parasitic virus which typically infects files with .exe or .com extensions.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

It is also called a document virus which is the viruses commonly found in programs such as Microsoft Word or Excel.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Boot Sector Viruses are viruses that modify the Master boot record and play with the Bootstrap. They load before the operating system loads and are viruses that work before the computer boots.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

... has the ability to change or mutate its underlying code without changing its basic functions or features. This enables the virus on a computer or network to evade detection even from the best antivirus or virus protection programs.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Stores itself on your computer’s memory which allows it to infect files on your computer. This virus can interfere with your operating system leading to file and program corruption.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?