Malware

Malware

University

7 Qs

quiz-placeholder

Similar activities

Chapter 3 Quiz

Chapter 3 Quiz

University

11 Qs

CyberSecurity

CyberSecurity

6th Grade - Professional Development

10 Qs

Quiz on Basics of Computer Security and SSH

Quiz on Basics of Computer Security and SSH

University

12 Qs

Network Basic

Network Basic

University

10 Qs

Siege One

Siege One

University

10 Qs

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

Studio - U3 - LO1-1.2 Types of Cyber Security incidents

9th Grade - University

10 Qs

Cybersecurity Attack Types Quiz

Cybersecurity Attack Types Quiz

5th Grade - University

10 Qs

Types of Computer Viruses

Types of Computer Viruses

University

10 Qs

Malware

Malware

Assessment

Quiz

Computers

University

Medium

Created by

Hala Alqahtani

Used 11+ times

FREE Resource

7 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is malware?

Software that improves system performance

Software designed to infiltrate and harm systems

A legitimate application for cybersecurity

Software for managing data securely

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which malware type disguises itself as legitimate software?

Adware

Virus

Worm

Trojan Horse

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

How does ransomware typically operate?

Gains administrative access to systems

Encrypts files and demands payment

Displays intrusive advertisements

Monitors user activity

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What method is used by attackers in phishing attacks?

Compromising USB drives

Injecting malicious ads into websites

Sending deceptive emails with malicious links

Exploiting software vulnerabilities

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which type of malware operates in system memory without leaving files on the hard drive?

Fileless malware

Spyware

Rootkits

Botnets

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the primary impact of a botnet?

Enabling large-scale attacks like DDoS

Displaying advertisements

Encrypting user files

Monitoring user behavior

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is one key prevention strategy against malware?

Downloading software from P2P networks

Using DNS spoofing

Avoiding software updates

Implementing two-factor authentication (2FA)