Level 5 - Malware Quiz

Level 5 - Malware Quiz

10 Qs

quiz-placeholder

Similar activities

Lightning: Read and check T/F

Lightning: Read and check T/F

KG - University

10 Qs

Schülprüfungsvorbereitung 2

Schülprüfungsvorbereitung 2

KG - University

15 Qs

แบบทดสอบก่อน/หลังเรียน The future of shopping

แบบทดสอบก่อน/หลังเรียน The future of shopping

KG - University

13 Qs

Motor Vehicle G3 Quiz

Motor Vehicle G3 Quiz

KG - University

10 Qs

Level 5 - Malware Quiz

Level 5 - Malware Quiz

Assessment

Quiz

others

Hard

Created by

Eric Jones

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware type uses legitimate programs to infect a computer, operating in memory, and doesn't rely on files?

A) Trojan horse
B) Worm
C) Fileless virus
D) Rootkit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware type can self-replicate and spread across computer networks without any user assistance?

A) Worm
B) Fileless virus
C) Trojan horse
D) Rootkit

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious program that disguises itself as legitimate or desirable software and often contains spying functions is known as a:

A) Rootkit
B) Trojan horse
C) Fileless virus
D) Worm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware allows remote software updates and control by a command and control center called a zombie master?

A) Trojan horse
B) Fileless virus
C) Zombie
D) Botnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of zombie computers commanded from a central control infrastructure is known as a:

A) Zombie
B) Trojan horse
C) Botnet
D) Rootkit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of programs that allows attackers to maintain permanent administrator-level, hidden access to a computer is known as a:

A) Fileless virus
B) Botnet
C) Zombie
D) Rootkit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This software is designed to intercept or take partial control over the user's interaction with the computer and is installed without the user's consent or knowledge:

A) Fileless virus
B) Spyware
C) Worm
D) Trojan horse

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?