Chapter 3 (fundamentals of Security)

Chapter 3 (fundamentals of Security)

University

10 Qs

quiz-placeholder

Similar activities

ITBP301_Chapter 05

ITBP301_Chapter 05

University

10 Qs

Cobb Future Fest Quiz

Cobb Future Fest Quiz

University

10 Qs

Quiz for computer virus-Teacher Mae

Quiz for computer virus-Teacher Mae

University

13 Qs

Types of Computer Viruses

Types of Computer Viruses

University

10 Qs

Malware And Hackers

Malware And Hackers

KG - University

14 Qs

Malware&Phishing

Malware&Phishing

University

12 Qs

 Chapter 9: Securing Your System: Protecting Your Digital Data a

Chapter 9: Securing Your System: Protecting Your Digital Data a

University

13 Qs

Identifying Security Threats and Vulnerabilities

Identifying Security Threats and Vulnerabilities

University

10 Qs

Chapter 3 (fundamentals of Security)

Chapter 3 (fundamentals of Security)

Assessment

Quiz

Computers

University

Medium

Created by

Kelly Gafford

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of malware encrypts a user's files and demands a ransom to restore access?

Worm

Keylogger

Ransomware

Spyware

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following best describes cryptomalware?

A type of malware that displays pop-up ads on the screen.
A type of malware that encrypts files and demands a ransom for decryption.
A type of malware that slows down computer performance.
A type of malware that deletes files without encryption.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

A __________ virus attaches itself to executable files and spreads when the infected file is executed.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How does a fileless virus typically operate?

A fileless virus operates by infecting physical files on the hard drive.
A fileless virus operates by residing in the computer's memory rather than on the hard drive.
A fileless virus operates by displaying pop-up messages on the screen.
A fileless virus operates by encrypting all files on the computer.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

__________ are self-replicating malware that spread independently over networks without the need for a host file.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of malware is often used to form botnets?

Bots

Worm
Ransomware
Spyware

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a common characteristic of spyware?

Encrypts user files

Records user activity and gathers information without consent

Replicates itself and spreads across networks

Deletes files on specific dates

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?