Understanding Malware

Understanding Malware

12th Grade

15 Qs

quiz-placeholder

Similar activities

personal letter

personal letter

12th Grade

20 Qs

Computer Safety

Computer Safety

7th Grade - University

15 Qs

The Crucible Acts 1-2 Vocabulary: Synonyms & Antonyms

The Crucible Acts 1-2 Vocabulary: Synonyms & Antonyms

11th - 12th Grade

15 Qs

Vocabulary for Success 9th Grade Lesson 1 Words

Vocabulary for Success 9th Grade Lesson 1 Words

9th - 12th Grade

16 Qs

Tyrell and Shay’s housewarming quiz

Tyrell and Shay’s housewarming quiz

12th Grade

15 Qs

could vs. was able to

could vs. was able to

10th - 12th Grade

16 Qs

Cyber security

Cyber security

12th Grade

13 Qs

Vocabulary about cybersecurity

Vocabulary about cybersecurity

10th Grade - University

20 Qs

Understanding Malware

Understanding Malware

Assessment

Quiz

English

12th Grade

Easy

Created by

Baba Shaheer

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which trojan stole banking information?

Conficker

Zeus

WannaCry

ILOVEYOU

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which adware infected millions of devices and manipulated web traffic?

Fireball

CoolWebSearch

Sony BMG

Mirai

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How can firewalls be used effectively?

Use firewalls to block unauthorized access to systems and networks.

Disable firewalls to allow all traffic.

Use firewalls only during business hours.

Use firewalls to monitor employee activities.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a common mitigation method for ransomware?

Using adware removal tools

Regularly backing up data

Creating a backdoor

Hiding the existence of certain processes

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What do viruses attach themselves to?

Network vulnerabilities

Legitimate programs

Browsing habits

Email attachments

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of botnet is controlled via Internet Relay Chat?

IRC botnets

HTTP botnets

Email worms

Internet worms

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the impact of crypters?

They make malware harder to detect and remove

They can consume bandwidth

They can monitor browsing habits

They can record keystrokes

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?