Malware Awareness Quiz

Malware Awareness Quiz

12th Grade

70 Qs

quiz-placeholder

Similar activities

MS Unit 4 Review

MS Unit 4 Review

SEC+Practice Quiz B27-B48

SEC+Practice Quiz B27-B48

SecurityFUndamentals Unit 1 Review

SecurityFUndamentals Unit 1 Review

MTA SecFun Review

MTA SecFun Review

Network Security Vocab Part 1

Network Security Vocab Part 1

Cybersecurity Quiz

Cybersecurity Quiz

Malware Awareness Quiz

Malware Awareness Quiz

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Glenn Webb

Used 1+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

70 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Jennifer decided that the licensing cost for a piece of video editing software was too expensive. Instead, she decided to download a keygen program to generate her own license key and install a pirated version of the editing software. After she runs the keygen, a license key is created, but her system performance becomes very sluggish and her antimalware suite begins to display numerous alerts.

Worm

Trojan

Adware

Logic bomb

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Jeffrey, the Security Operations Center director for Security Time Corporation, received a pop-up message on his workstation that said “You will regret firing me, just wait until Christmas!” He suspects the message that a disgruntled former employee may have setup a piece of software to create this pop-up on his machine, and is concerned what other code might be lurking that will create a negative effect on Christmas. He directs his team of cybersecurity analysts to begin search the network for this suspicious code. What type of malware are they searching for?

Worm

Trojan

Adware

Logic bomb

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Your organization has been receiving a lot of phishing emails recently and you are trying to determine why they are effective in getting your users to click on their links. The latest email consists of what looks like an advertisement that is offering an exclusive early access opportunity to buy a new iPhone at a discounted price, but there are only 5 phones available at this price. What type of social engineering principle is being exploited here?

Familiarity

Scarcity

Intimidation

Trust

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Tierra works as a cybersecurity analyst for a large multi-national oil and gas company. She is responding to an incident at her company in which their public-facing web server has been defaced with the words, “Killers of the Arctic”. She believes this was done in response to her company’s latest oil drilling project in the Arctic Circle. Which group is most likely to blame for the website defacement?

Script kiddies

Organized crime

APT

Hacktivist

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

During your annual cybersecurity awareness training in your company, the instructor states that employees should be careful as to what information they post on social media. According to the instructor, if you post too much personal information on social media, such as your name, birthday, hometown, and other personal details, it is much easier for an attacker to conduct which type of attack in order to break your passwords?

Birthday attack

Brute force attack

Cognitive password attack

Rainbow table attack

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

During a search of your network, you discovered an unauthorized device that is allowing access to networked resources. What type of attack is being used?

Bluesnarfing

Bluejacking

IV attack

Rogue access point

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

You are hiring a penetration testing firm to conduct an assessment of your company’s network. As part of the contract, your company has specified that they will not provide any details of the network to the penetration testing firm. Instead, the company wants to see how much information about the network the firm can find using open source research and by conducting scanning of the corporate network. What type of assessment is this?

White Box

Gray Box

Blue Box

Black Box

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?