Search Header Logo

Unit 3 - 2.4.1 - Malware

Authored by PHILLIP VEET

Computers

12th Grade

10 Questions

Unit 3 - 2.4.1 - Malware
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a characteristic of viruses?

They can self-replicate

They rely on authorized programs to spread

They encrypt information on systems

They record user keystrokes

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the distinguishing feature of crypto-malware?

It utilizes CPU cycles to generate encryption keys

It records user activity without permission

It relies on authorized programs to operate

It makes your device slower and takes up space

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What differentiates ransomware from other forms of crypto-malware?

It encrypts information on systems

It holds victim's information for ransom

It creates a denial of service with no promise of returning access

It spreads autonomously without relying on programs

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary characteristic of trojan malware?

It self-replicates

It encrypts information on systems

It utilizes authorized programs to subvert system defenses

It records user keystrokes

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What distinguishes worms from viruses?

They attach themselves to system processes

They rely on authorized programs to spread

They can self-replicate without relying on programs

They encrypt information on systems

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary function of spyware?

To self-replicate and spread across systems

To encrypt information on systems

To listen to user activity without permission

To gain administrative credentials on a system

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are bloatware applications primarily used for?

To slow down devices and take up space

To record user keystrokes

To encrypt information on systems

To self-replicate and spread across systems

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?