
Chapter 3 (fundamentals of Security)
Authored by Kelly Gafford
Computers
University
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of malware encrypts a user's files and demands a ransom to restore access?
Worm
Keylogger
Ransomware
Spyware
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following best describes cryptomalware?
3.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
A (a) virus attaches itself to executable files and spreads when the infected file is executed.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How does a fileless virus typically operate?
5.
FILL IN THE BLANKS QUESTION
1 min • 1 pt
(a) are self-replicating malware that spread independently over networks without the need for a host file.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of malware is often used to form botnets?
Bots
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a common characteristic of spyware?
Encrypts user files
Records user activity and gathers information without consent
Replicates itself and spreads across networks
Deletes files on specific dates
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?