Cyber EOP - Types of Threats By Mr. B

Cyber EOP - Types of Threats By Mr. B

9th - 12th Grade

18 Qs

quiz-placeholder

Similar activities

BTEC IT Unit 1 - D1 Threats to data

BTEC IT Unit 1 - D1 Threats to data

10th - 12th Grade

15 Qs

Cybersecurity Lesson 4 - Malware Quiz

Cybersecurity Lesson 4 - Malware Quiz

12th Grade

14 Qs

Malware Types

Malware Types

12th Grade

15 Qs

Recap on Malware

Recap on Malware

12th Grade

13 Qs

040_An Overview of Malware – CompTIA Security+ SY0-701

040_An Overview of Malware – CompTIA Security+ SY0-701

9th Grade - University

20 Qs

Network Security

Network Security

9th Grade

13 Qs

Malware

Malware

9th - 11th Grade

15 Qs

Computer viruses

Computer viruses

10th Grade

15 Qs

Cyber EOP - Types of Threats By Mr. B

Cyber EOP - Types of Threats By Mr. B

Assessment

Quiz

Computers

9th - 12th Grade

Hard

Created by

Cyber Professor - Mr. B

FREE Resource

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What type of malware disables a victim's access to data until a ransom is paid?

Trojan

Spyware

Ransomware

Adware

Answer explanation

Ransomware is a type of malware that locks or encrypts a victim's data, demanding a ransom for access restoration. Unlike Trojans, spyware, or adware, ransomware specifically targets data access for financial gain.

2.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which malware type makes changes to files that are native to the operating system?

Fileless Malware

Wiper Malware

Keyloggers

Bots

Answer explanation

Fileless malware operates in memory and can manipulate native operating system files without leaving traditional traces, making it a significant threat. Other options like wiper malware and keyloggers do not specifically alter OS-native files.

3.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What is the primary function of spyware?

To collect user activity data without their knowledge

To serve unwanted advertisements

To disguise itself as desirable software

To replicate itself across networks

Answer explanation

The primary function of spyware is to collect user activity data without their knowledge, often for malicious purposes. This distinguishes it from other software types that may serve ads or replicate themselves.

4.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which malware type is known for hijacking browsers to change default search engines?

Trojan

Ransomware

Worms

Adware

Answer explanation

Adware is a type of malware that often hijacks browsers to change default search engines and display unwanted ads. Unlike Trojans, ransomware, or worms, adware specifically targets browser settings.

5.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What does a Trojan disguise itself as?

Malicious code

A legitimate application

A network worm

Desirable code or software

Answer explanation

A Trojan disguises itself as desirable code or software to trick users into downloading it, unlike malicious code which is overtly harmful. This deception is key to its ability to infiltrate systems.

6.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which malware was developed to target Iran's nuclear program?

Triada

Stuxnet

Emotet

Zacinlo

Answer explanation

Stuxnet is a well-known malware specifically designed to disrupt Iran's nuclear program by targeting its industrial control systems, making it the correct answer.

7.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What is a keylogger primarily used for?

To serve advertisements

To launch DDoS attacks

To erase user data

To monitor user keystrokes

Answer explanation

A keylogger is primarily used to monitor user keystrokes, capturing what users type on their keyboards. This can include sensitive information like passwords and personal messages, making it a tool for spying rather than for advertising or data deletion.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?