Revision for Chapter 3

Revision for Chapter 3

University

24 Qs

quiz-placeholder

Similar activities

Cyber Fun Password Attack Quiz

Cyber Fun Password Attack Quiz

9th Grade - University

20 Qs

ASM655  Chapter 1 Quiz

ASM655 Chapter 1 Quiz

University

20 Qs

Cysec Club - Workshop Quiz

Cysec Club - Workshop Quiz

University

20 Qs

Knowing Yourself & Enemy

Knowing Yourself & Enemy

University

19 Qs

WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

10th Grade - University

19 Qs

OS2-rsst-quiz in midterm

OS2-rsst-quiz in midterm

University

20 Qs

Midterm in Social and Professional Issues

Midterm in Social and Professional Issues

University

25 Qs

Cybersecurity

Cybersecurity

10th Grade - University

20 Qs

Revision for Chapter 3

Revision for Chapter 3

Assessment

Quiz

Computers

University

Hard

Created by

Kevin Wong

Used 1+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the types of malware?

Viruses - Melissa Virus

Worms - Code Red Worm

Trojan horse,

Logic bomb

Ransomware

Backdoors and Rootkits

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Describe one malware that requires user's intervention

Answer explanation

Media Image

Most viruses require end-user initiation, and can activate at a specific time or date

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Explain the first characteristics of malware in computer systems.

Answer explanation

Disrupt computer operations without the user's knowledge or permission

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Explain the second characteristics of malware in computer systems.

Answer explanation

Gain Access to computer systems, without the user's knowledge or permission

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Describe one malware that does not require user participation

Answer explanation

Worms no longer require user participation

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A malware silently carries out malicious operations

while Peter plays an online game. What malware is that?

Answer explanation

Media Image

A Trojan horse is malware that carries out malicious operations under the guise of a desired operation such as playing an online game.

This malicious code exploits the privileges of the user that runs it. A trojan horse differs from a virus because the Trojan binds itself to non-executable files, such as image files, audio files, or games.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Four triggers that could awaken a malicious program like Logic Bomb are

date

time

programs running

delete user account

Answer explanation

A malicious program that uses a trigger to awaken the malicious code.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?