Search Header Logo

Cyber EOP - Types of Threats By Mr. B

Authored by Cyber Professor - Mr. B

Computers

9th - 12th Grade

Cyber EOP - Types of Threats By Mr. B
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

18 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What type of malware disables a victim's access to data until a ransom is paid?

Trojan

Spyware

Ransomware

Adware

Answer explanation

Ransomware is a type of malware that locks or encrypts a victim's data, demanding a ransom for access restoration. Unlike Trojans, spyware, or adware, ransomware specifically targets data access for financial gain.

2.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which malware type makes changes to files that are native to the operating system?

Fileless Malware

Wiper Malware

Keyloggers

Bots

Answer explanation

Fileless malware operates in memory and can manipulate native operating system files without leaving traditional traces, making it a significant threat. Other options like wiper malware and keyloggers do not specifically alter OS-native files.

3.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What is the primary function of spyware?

To collect user activity data without their knowledge

To serve unwanted advertisements

To disguise itself as desirable software

To replicate itself across networks

Answer explanation

The primary function of spyware is to collect user activity data without their knowledge, often for malicious purposes. This distinguishes it from other software types that may serve ads or replicate themselves.

4.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which malware type is known for hijacking browsers to change default search engines?

Trojan

Ransomware

Worms

Adware

Answer explanation

Adware is a type of malware that often hijacks browsers to change default search engines and display unwanted ads. Unlike Trojans, ransomware, or worms, adware specifically targets browser settings.

5.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What does a Trojan disguise itself as?

Malicious code

A legitimate application

A network worm

Desirable code or software

Answer explanation

A Trojan disguises itself as desirable code or software to trick users into downloading it, unlike malicious code which is overtly harmful. This deception is key to its ability to infiltrate systems.

6.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

Which malware was developed to target Iran's nuclear program?

Triada

Stuxnet

Emotet

Zacinlo

Answer explanation

Stuxnet is a well-known malware specifically designed to disrupt Iran's nuclear program by targeting its industrial control systems, making it the correct answer.

7.

MULTIPLE CHOICE QUESTION

1 min • 3 pts

What is a keylogger primarily used for?

To serve advertisements

To launch DDoS attacks

To erase user data

To monitor user keystrokes

Answer explanation

A keylogger is primarily used to monitor user keystrokes, capturing what users type on their keyboards. This can include sensitive information like passwords and personal messages, making it a tool for spying rather than for advertising or data deletion.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?