Level 5 - Malware Quiz

Level 5 - Malware Quiz

10 Qs

quiz-placeholder

Similar activities

Level 5 - Security Zones Quiz

Level 5 - Security Zones Quiz

KG - University

15 Qs

IIIPI TEMA5: SEGURIDAD EN REDES WIRELES

IIIPI TEMA5: SEGURIDAD EN REDES WIRELES

10th Grade

10 Qs

Odyssey Intro Quiz

Odyssey Intro Quiz

KG - University

5 Qs

ITN7 - Module 16 Quiz

ITN7 - Module 16 Quiz

KG - University

15 Qs

Cyber Security Vocabulary (Set 3)

Cyber Security Vocabulary (Set 3)

KG - University

10 Qs

POST-TEST(KOMUNIKASI DATA DAN KONEKTIVITAS INTERNET)

POST-TEST(KOMUNIKASI DATA DAN KONEKTIVITAS INTERNET)

KG - University

10 Qs

Spring Test 2024 for Class V  Form

Spring Test 2024 for Class V Form

KG - University

11 Qs

quizIZZ 4-1

quizIZZ 4-1

KG - University

10 Qs

Level 5 - Malware Quiz

Level 5 - Malware Quiz

Assessment

Quiz

others

Hard

Created by

Eric Jones

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware type uses legitimate programs to infect a computer, operating in memory, and doesn't rely on files?
A) Trojan horse
B) Worm
C) Fileless virus
D) Rootkit

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which malware type can self-replicate and spread across computer networks without any user assistance?
A) Worm
B) Fileless virus
C) Trojan horse
D) Rootkit

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A malicious program that disguises itself as legitimate or desirable software and often contains spying functions is known as a:
A) Rootkit
B) Trojan horse
C) Fileless virus
D) Worm

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware allows remote software updates and control by a command and control center called a zombie master?
A) Trojan horse
B) Fileless virus
C) Zombie
D) Botnet

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A group of zombie computers commanded from a central control infrastructure is known as a:
A) Zombie
B) Trojan horse
C) Botnet
D) Rootkit

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A set of programs that allows attackers to maintain permanent administrator-level, hidden access to a computer is known as a:
A) Fileless virus
B) Botnet
C) Zombie
D) Rootkit

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This software is designed to intercept or take partial control over the user's interaction with the computer and is installed without the user's consent or knowledge:
A) Fileless virus
B) Spyware
C) Worm
D) Trojan horse

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?