Lesson 20 - Malware

Lesson 20 - Malware

University

8 Qs

quiz-placeholder

Similar activities

IT Vocabulary Quiz

IT Vocabulary Quiz

8th Grade - University

12 Qs

Data Breach Quiz

Data Breach Quiz

University

12 Qs

Cyber Security

Cyber Security

12th Grade - Professional Development

8 Qs

Quiz for computer virus-Teacher Mae

Quiz for computer virus-Teacher Mae

University

13 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Securing Windows

Securing Windows

9th Grade - University

10 Qs

Basic Networking (Y8)

Basic Networking (Y8)

7th Grade - University

10 Qs

QUIZ

QUIZ

University

10 Qs

Lesson 20 - Malware

Lesson 20 - Malware

Assessment

Quiz

Computers

University

Hard

Created by

Alejandro Gomez

FREE Resource

8 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is able to replicate itself without human intervention required

Virus

Trojan

Worm

Backdoor

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware requires infecting host programs to operate?

Virus

Backdoors

Trojans

Spyware

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the type of malware that modifies the start of the binary to jump to the malicious code, and then return back to the normal execution flow?

Cavity malware

Overwriting malware

A

Appending malware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the main goal of using a packer?

To perform social engineer attacks

To increase malware stability

To add an extra layer of code that's wrapped around a piece of malware to conceal it

To unpack the malware in memory

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What malware polymorphism is?

a type of malware that can disable the antivirus

a type of malware that is managed through a command and control server

a type of malware that is programmed to repeatedly mutate its appearance

None of the answers is correct

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's the name of the technique used to load malicious code in an application once the antivirus has already checked it?

Static code replacement

Code injection

Dynamic code replacement

DLL hijacking

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What's an exploit kit?

A trojan horse that infects windows systems

is a type of toolkit cybercriminals use to attack vulnerabilities in systems so they can distribute malware or perform other malicious activities

A kit created to bypass AV/EDR systems

A kit that allows to develop exploits to target operating systems

8.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a modern exploit kit?

Firepack

Neutrino

Fiesta

LuckySploit