Unit 5 Malware Exam Review

Unit 5 Malware Exam Review

9th - 12th Grade

52 Qs

quiz-placeholder

Similar activities

POSTEST TCC-GC 2 - SGSI

POSTEST TCC-GC 2 - SGSI

1st Grade - Professional Development

50 Qs

ACWM Bloque III

ACWM Bloque III

12th Grade

49 Qs

Ujian Sekolah TIK estise

Ujian Sekolah TIK estise

9th Grade

52 Qs

Practice Test

Practice Test

11th Grade

50 Qs

Algoritmika 1.

Algoritmika 1.

10th Grade - University

50 Qs

General Review Grade 7

General Review Grade 7

7th - 12th Grade

50 Qs

DDPTJKT - Latihan Soal PTS Genap

DDPTJKT - Latihan Soal PTS Genap

10th Grade - University

50 Qs

HTML CSS Quiz FOR CLASS 10TH

HTML CSS Quiz FOR CLASS 10TH

10th Grade

52 Qs

Unit 5 Malware Exam Review

Unit 5 Malware Exam Review

Assessment

Quiz

Computers

9th - 12th Grade

Medium

Created by

Jaime McQueen

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

52 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Malicious software collecting information about users without their knowledge/consent is known as:

Trojan

Backdoor

Virus

Adware

Spyware

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which type of files pose the greatest risk related to the distribution of malware?

.png

.exe

.txt

.pdf

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A collection of zombies is known as:

Extranet

Intranet

Botnet

Ethernet

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

Trojan

Rootkit

Armored virus

Backdoor

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service or an entire computer system?

Spyware

Trojan horse

Rootkit

Backdoor

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Media Image

What does 'DOS' attack stand for

Doom of System
Don't Open Service
Denial of Service
Didn't Order Security

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malicious code are known as:

Repositories

Signature files

Macros

Security logs

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?