
Study Guide: Unit 3A - Malware
Authored by Victoria Berkowitz
Computers
11th Grade
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
41 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec ⢠1 pt
Which of the following is a characteristic of viruses?
They can self-replicate
They rely on authorized programs to spread
They encrypt information on systems
They record user keystrokes
2.
MULTIPLE CHOICE QUESTION
30 sec ⢠1 pt
What is the primary characteristic of trojan malware?
It self-replicates
It encrypts information on systems
It utilizes authorized programs to subvert system defenses
It records user keystrokes
3.
MULTIPLE CHOICE QUESTION
30 sec ⢠1 pt
What distinguishes worms from viruses?
They attach themselves to system processes
They rely on authorized programs to spread
They can self-replicate without relying on programs
They encrypt information on systems
4.
MULTIPLE CHOICE QUESTION
30 sec ⢠1 pt
What is the primary function of spyware?
To self-replicate and spread across systems
To encrypt information on systems
To listen to user activity without permission
To gain administrative credentials on a system
5.
MULTIPLE CHOICE QUESTION
30 sec ⢠1 pt
What is the purpose of a keylogger?
To listen to user activity without permission
To gain administrative credentials on a system
To self-replicate and spread across systems
To record user's keystrokes to glean information
6.
MULTIPLE CHOICE QUESTION
30 sec ⢠1 pt
What is the defining characteristic of bots in the context of malware?
They autonomously act on actions typically sent from a Command and Control server
They hold victim's information for ransom
They utilize CPU cycles to generate encryption keys
They spread autonomously without relying on programs
7.
MULTIPLE CHOICE QUESTION
30 sec ⢠1 pt
What is the primary function of a rootkit?
To listen to user activity without permission
To self-replicate and spread across systems
To gain administrative credentials on a system
To encrypt information on systems
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
77 questions
Tin hį»c
Quiz
ā¢
11th Grade
80 questions
Edexcel Computer Science- Topic 1&6 Part 1 (1 to 60)
Quiz
ā¢
10th - 11th Grade
71 questions
CĆ¢u Hį»i Ćn Tįŗp Tin Hį»c 11
Quiz
ā¢
11th Grade
80 questions
Financial Planning Semester Exam
Quiz
ā¢
11th Grade
80 questions
BTEC IT Unit 1 Bumper Quiz
Quiz
ā¢
11th Grade - University
73 questions
Computer CPU Quiz
Quiz
ā¢
11th Grade
80 questions
WAN
Quiz
ā¢
10th - 12th Grade
77 questions
Pemrograman Web Dinamis
Quiz
ā¢
9th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
ā¢
3rd Grade
20 questions
Equivalent Fractions
Quiz
ā¢
3rd Grade
25 questions
Multiplication Facts
Quiz
ā¢
5th Grade
29 questions
Alg. 1 Section 5.1 Coordinate Plane
Quiz
ā¢
9th Grade
22 questions
fractions
Quiz
ā¢
3rd Grade
11 questions
FOREST Effective communication
Lesson
ā¢
KG
20 questions
Main Idea and Details
Quiz
ā¢
5th Grade
20 questions
Context Clues
Quiz
ā¢
6th Grade
Discover more resources for Computers
20 questions
-AR -ER -IR present tense
Quiz
ā¢
10th - 12th Grade
22 questions
El Imperfecto
Quiz
ā¢
9th - 12th Grade
15 questions
ACT Reading Practice
Quiz
ā¢
11th Grade
20 questions
SSS/SAS
Quiz
ā¢
9th - 12th Grade
20 questions
verbos reflexivos en espaƱol
Quiz
ā¢
9th - 12th Grade
14 questions
Making Inferences From Samples
Quiz
ā¢
7th - 12th Grade
23 questions
CCG - CH8 Polygon angles and area Review
Quiz
ā¢
9th - 12th Grade
8 questions
Momentum and Collisions
Lesson
ā¢
9th - 12th Grade