Search Header Logo

Identifying Malware

Authored by Graham Carmichael

Computers

Professional Development

Used 4+ times

Identifying Malware
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware type encrypts a user's files and demands a ransom for the decryption key.

Trojan

Virus

Ransomware

Adware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of malware can replicate itself and spread to other computers without human intervention.

Worm

Keylogger

Spyware

Rootkit

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware disguises itself as legitimate software to trick users into downloading and installing it.

Ransomware

Trojan

Virus

Botnet

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This type of malware is designed to secretly record the keystrokes of a user.

Spyware

Adware

Keylogger

Worm

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A network of infected devices controlled by a hacker, often used for coordinated attacks or other malicious activities.

Exploit Kit

Botnet

Trojan

Virus

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware type operates by displaying unwanted advertisements on a user's computer.

Adware

Spyware

Rootkit

Virus

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This malware collects information about a user without their knowledge, often for data theft.

Keylogger

Ransomware

Spyware

Worm

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?