
Cyber EOP - Types of Threats By Mr. B
Authored by Cyber Professor - Mr. B
Computers
9th - 12th Grade

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
What type of malware disables a victim's access to data until a ransom is paid?
Trojan
Spyware
Ransomware
Adware
Answer explanation
Ransomware is a type of malware that locks or encrypts a victim's data, demanding a ransom for access restoration. Unlike Trojans, spyware, or adware, ransomware specifically targets data access for financial gain.
2.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
Which malware type makes changes to files that are native to the operating system?
Fileless Malware
Wiper Malware
Keyloggers
Bots
Answer explanation
Fileless malware operates in memory and can manipulate native operating system files without leaving traditional traces, making it a significant threat. Other options like wiper malware and keyloggers do not specifically alter OS-native files.
3.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
What is the primary function of spyware?
To collect user activity data without their knowledge
To serve unwanted advertisements
To disguise itself as desirable software
To replicate itself across networks
Answer explanation
The primary function of spyware is to collect user activity data without their knowledge, often for malicious purposes. This distinguishes it from other software types that may serve ads or replicate themselves.
4.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
Which malware type is known for hijacking browsers to change default search engines?
Trojan
Ransomware
Worms
Adware
Answer explanation
Adware is a type of malware that often hijacks browsers to change default search engines and display unwanted ads. Unlike Trojans, ransomware, or worms, adware specifically targets browser settings.
5.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
What does a Trojan disguise itself as?
Malicious code
A legitimate application
A network worm
Desirable code or software
Answer explanation
A Trojan disguises itself as desirable code or software to trick users into downloading it, unlike malicious code which is overtly harmful. This deception is key to its ability to infiltrate systems.
6.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
Which malware was developed to target Iran's nuclear program?
Triada
Stuxnet
Emotet
Zacinlo
Answer explanation
Stuxnet is a well-known malware specifically designed to disrupt Iran's nuclear program by targeting its industrial control systems, making it the correct answer.
7.
MULTIPLE CHOICE QUESTION
1 min • 3 pts
What is a keylogger primarily used for?
To serve advertisements
To launch DDoS attacks
To erase user data
To monitor user keystrokes
Answer explanation
A keylogger is primarily used to monitor user keystrokes, capturing what users type on their keyboards. This can include sensitive information like passwords and personal messages, making it a tool for spying rather than for advertising or data deletion.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?