Lesson 20 - Malware

Lesson 20 - Malware

University

8 Qs

quiz-placeholder

Similar activities

Cyber Security Threats/Attacks Quiz

Cyber Security Threats/Attacks Quiz

University

10 Qs

Cyberthreats

Cyberthreats

University

10 Qs

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

UIT 2221 ICT SFETY AND SECURITY (COPTPA)

University

10 Qs

Chapter 3 Quiz

Chapter 3 Quiz

University

11 Qs

QUIZ #1

QUIZ #1

University

10 Qs

Cybersecurty Concepts

Cybersecurty Concepts

University

10 Qs

CSF Week 2

CSF Week 2

University

10 Qs

SecureMind Quiz

SecureMind Quiz

University

13 Qs

Lesson 20 - Malware

Lesson 20 - Malware

Assessment

Quiz

Computers

University

Hard

Created by

Alejandro Gomez

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is able to replicate itself without human intervention required

Virus

Trojan

Worm

Backdoor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware requires infecting host programs to operate?

Virus

Backdoors

Trojans

Spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the type of malware that modifies the start of the binary to jump to the malicious code, and then return back to the normal execution flow?

Cavity malware

Overwriting malware

A

Appending malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the main goal of using a packer?

To perform social engineer attacks

To increase malware stability

To add an extra layer of code that's wrapped around a piece of malware to conceal it

To unpack the malware in memory

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What malware polymorphism is?

a type of malware that can disable the antivirus

a type of malware that is managed through a command and control server

a type of malware that is programmed to repeatedly mutate its appearance

None of the answers is correct

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the name of the technique used to load malicious code in an application once the antivirus has already checked it?

Static code replacement

Code injection

Dynamic code replacement

DLL hijacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's an exploit kit?

A trojan horse that infects windows systems

is a type of toolkit cybercriminals use to attack vulnerabilities in systems so they can distribute malware or perform other malicious activities

A kit created to bypass AV/EDR systems

A kit that allows to develop exploits to target operating systems

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a modern exploit kit?

Firepack

Neutrino

Fiesta

LuckySploit

Discover more resources for Computers