Study Guide: Unit 3A - Malware

Study Guide: Unit 3A - Malware

11th Grade

41 Qs

quiz-placeholder

Similar activities

Prueba 1 Computación

Prueba 1 Computación

10th Grade - University

72 Qs

WAN

WAN

10th - 12th Grade

80 Qs

Pemrograman Web Dinamis

Pemrograman Web Dinamis

9th - 12th Grade

77 Qs

AWS_Practice_Exam

AWS_Practice_Exam

9th - 12th Grade

75 Qs

Uji Pemahaman Pembuatan File dan Folder

Uji Pemahaman Pembuatan File dan Folder

7th Grade - University

80 Qs

PTS - Internet Of Things

PTS - Internet Of Things

11th Grade

80 Qs

1101 M5 Review

1101 M5 Review

9th Grade - Professional Development

77 Qs

OCR GCSE Computer Science Paper 2

OCR GCSE Computer Science Paper 2

11th Grade

72 Qs

Study Guide: Unit 3A - Malware

Study Guide: Unit 3A - Malware

Assessment

Quiz

Computers

11th Grade

Easy

Created by

Victoria Berkowitz

Used 2+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

41 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of viruses?

They can self-replicate

They rely on authorized programs to spread

They encrypt information on systems

They record user keystrokes

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary characteristic of trojan malware?

It self-replicates

It encrypts information on systems

It utilizes authorized programs to subvert system defenses

It records user keystrokes

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes worms from viruses?

They attach themselves to system processes

They rely on authorized programs to spread

They can self-replicate without relying on programs

They encrypt information on systems

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of spyware?

To self-replicate and spread across systems

To encrypt information on systems

To listen to user activity without permission

To gain administrative credentials on a system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a keylogger?

To listen to user activity without permission

To gain administrative credentials on a system

To self-replicate and spread across systems

To record user's keystrokes to glean information

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the defining characteristic of bots in the context of malware?

They autonomously act on actions typically sent from a Command and Control server

They hold victim's information for ransom

They utilize CPU cycles to generate encryption keys

They spread autonomously without relying on programs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of a rootkit?

To listen to user activity without permission

To self-replicate and spread across systems

To gain administrative credentials on a system

To encrypt information on systems

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?