Revision for Chapter 3

Revision for Chapter 3

University

24 Qs

quiz-placeholder

Similar activities

Exploring Python Libraries

Exploring Python Libraries

University

20 Qs

Ethical And Social Issues In Information Systems

Ethical And Social Issues In Information Systems

University

20 Qs

Sistem Informasi Manajemen

Sistem Informasi Manajemen

University

20 Qs

ICT QUIZ

ICT QUIZ

University

20 Qs

Data Structure & Algo - Prelim Long Quiz

Data Structure & Algo - Prelim Long Quiz

University

21 Qs

Basic Computer Architecture Quiz

Basic Computer Architecture Quiz

University

20 Qs

SMARTICUS

SMARTICUS

University

20 Qs

Internet Technologies

Internet Technologies

University

20 Qs

Revision for Chapter 3

Revision for Chapter 3

Assessment

Quiz

Computers

University

Hard

Created by

Kevin Wong

Used 1+ times

FREE Resource

24 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the types of malware?

Viruses - Melissa Virus

Worms - Code Red Worm

Trojan horse,

Logic bomb

Ransomware

Backdoors and Rootkits

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Describe one malware that requires user's intervention

Answer explanation

Media Image

Most viruses require end-user initiation, and can activate at a specific time or date

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Explain the first characteristics of malware in computer systems.

Answer explanation

Disrupt computer operations without the user's knowledge or permission

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Explain the second characteristics of malware in computer systems.

Answer explanation

Gain Access to computer systems, without the user's knowledge or permission

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Describe one malware that does not require user participation

Answer explanation

Worms no longer require user participation

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A malware silently carries out malicious operations

while Peter plays an online game. What malware is that?

Answer explanation

Media Image

A Trojan horse is malware that carries out malicious operations under the guise of a desired operation such as playing an online game.

This malicious code exploits the privileges of the user that runs it. A trojan horse differs from a virus because the Trojan binds itself to non-executable files, such as image files, audio files, or games.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Four triggers that could awaken a malicious program like Logic Bomb are

date

time

programs running

delete user account

Answer explanation

A malicious program that uses a trigger to awaken the malicious code.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?