Revision for Chapter 3

Revision for Chapter 3

University

24 Qs

quiz-placeholder

Similar activities

ICT Short Quiz

ICT Short Quiz

University

20 Qs

QUIZ 2

QUIZ 2

University

20 Qs

DSA5541 Quiz 1 TRI 2210

DSA5541 Quiz 1 TRI 2210

University

20 Qs

Review Quiz (Chapter 3&4)

Review Quiz (Chapter 3&4)

University

20 Qs

C Programming Unit-1 Test-2

C Programming Unit-1 Test-2

University

20 Qs

Microprocessor

Microprocessor

University

20 Qs

Java Quiz 1

Java Quiz 1

University

20 Qs

6INFOMAN (Recitation)

6INFOMAN (Recitation)

University - Professional Development

20 Qs

Revision for Chapter 3

Revision for Chapter 3

Assessment

Quiz

Computers

University

Practice Problem

Hard

Created by

Kevin Wong

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

24 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the types of malware?

Viruses - Melissa Virus

Worms - Code Red Worm

Trojan horse,

Logic bomb

Ransomware

Backdoors and Rootkits

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Describe one malware that requires user's intervention

Answer explanation

Media Image

Most viruses require end-user initiation, and can activate at a specific time or date

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Explain the first characteristics of malware in computer systems.

Answer explanation

Disrupt computer operations without the user's knowledge or permission

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Explain the second characteristics of malware in computer systems.

Answer explanation

Gain Access to computer systems, without the user's knowledge or permission

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Describe one malware that does not require user participation

Answer explanation

Worms no longer require user participation

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A malware silently carries out malicious operations

while Peter plays an online game. What malware is that?

Answer explanation

Media Image

A Trojan horse is malware that carries out malicious operations under the guise of a desired operation such as playing an online game.

This malicious code exploits the privileges of the user that runs it. A trojan horse differs from a virus because the Trojan binds itself to non-executable files, such as image files, audio files, or games.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Four triggers that could awaken a malicious program like Logic Bomb are

date

time

programs running

delete user account

Answer explanation

A malicious program that uses a trigger to awaken the malicious code.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers