Search Header Logo

Understanding Malware

Authored by Baba Shaheer

English

12th Grade

Used 1+ times

Understanding Malware
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which trojan stole banking information?

Conficker

Zeus

WannaCry

ILOVEYOU

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which adware infected millions of devices and manipulated web traffic?

Fireball

CoolWebSearch

Sony BMG

Mirai

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can firewalls be used effectively?

Use firewalls to block unauthorized access to systems and networks.

Disable firewalls to allow all traffic.

Use firewalls only during business hours.

Use firewalls to monitor employee activities.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common mitigation method for ransomware?

Using adware removal tools

Regularly backing up data

Creating a backdoor

Hiding the existence of certain processes

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do viruses attach themselves to?

Network vulnerabilities

Legitimate programs

Browsing habits

Email attachments

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of botnet is controlled via Internet Relay Chat?

IRC botnets

HTTP botnets

Email worms

Internet worms

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the impact of crypters?

They make malware harder to detect and remove

They can consume bandwidth

They can monitor browsing habits

They can record keystrokes

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?