Revision for Chapter 3

Revision for Chapter 3

University

24 Qs

quiz-placeholder

Similar activities

Quiz on Network and Internet Privacy and Security

Quiz on Network and Internet Privacy and Security

University

20 Qs

Cybersecurity

Cybersecurity

University

21 Qs

Cybersecurity Quiz

Cybersecurity Quiz

University

20 Qs

Chapter 2 - Network & Computer Attacks #BNS3333

Chapter 2 - Network & Computer Attacks #BNS3333

University

22 Qs

Security

Security

12th Grade - Professional Development

24 Qs

cyber awareness

cyber awareness

University

20 Qs

BAB 11

BAB 11

University

20 Qs

IT Era - Midterm Special Quiz

IT Era - Midterm Special Quiz

University

20 Qs

Revision for Chapter 3

Revision for Chapter 3

Assessment

Quiz

Computers

University

Hard

Created by

Kevin Wong

Used 1+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the types of malware?

Viruses - Melissa Virus

Worms - Code Red Worm

Trojan horse,

Logic bomb

Ransomware

Backdoors and Rootkits

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Describe one malware that requires user's intervention

Answer explanation

Media Image

Most viruses require end-user initiation, and can activate at a specific time or date

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Explain the first characteristics of malware in computer systems.

Answer explanation

Disrupt computer operations without the user's knowledge or permission

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Explain the second characteristics of malware in computer systems.

Answer explanation

Gain Access to computer systems, without the user's knowledge or permission

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Describe one malware that does not require user participation

Answer explanation

Worms no longer require user participation

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A malware silently carries out malicious operations

while Peter plays an online game. What malware is that?

Answer explanation

Media Image

A Trojan horse is malware that carries out malicious operations under the guise of a desired operation such as playing an online game.

This malicious code exploits the privileges of the user that runs it. A trojan horse differs from a virus because the Trojan binds itself to non-executable files, such as image files, audio files, or games.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Four triggers that could awaken a malicious program like Logic Bomb are

date

time

programs running

delete user account

Answer explanation

A malicious program that uses a trigger to awaken the malicious code.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?