Search Header Logo

Study Guide: Unit 3A - Malware

Authored by Victoria Berkowitz

Computers

11th Grade

Used 2+ times

Study Guide: Unit 3A - Malware
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

41 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of viruses?

They can self-replicate

They rely on authorized programs to spread

They encrypt information on systems

They record user keystrokes

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary characteristic of trojan malware?

It self-replicates

It encrypts information on systems

It utilizes authorized programs to subvert system defenses

It records user keystrokes

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes worms from viruses?

They attach themselves to system processes

They rely on authorized programs to spread

They can self-replicate without relying on programs

They encrypt information on systems

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of spyware?

To self-replicate and spread across systems

To encrypt information on systems

To listen to user activity without permission

To gain administrative credentials on a system

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a keylogger?

To listen to user activity without permission

To gain administrative credentials on a system

To self-replicate and spread across systems

To record user's keystrokes to glean information

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the defining characteristic of bots in the context of malware?

They autonomously act on actions typically sent from a Command and Control server

They hold victim's information for ransom

They utilize CPU cycles to generate encryption keys

They spread autonomously without relying on programs

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of a rootkit?

To listen to user activity without permission

To self-replicate and spread across systems

To gain administrative credentials on a system

To encrypt information on systems

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?