• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

FREE COMPUTERS AND STUDY GAMES ABOUT MALWARE

Class notes Jan 11, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

FREE COMPUTERS AND STUDY GAMES ABOUT MALWARE

QUIZ EXAM QUESTIONS

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -15 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: Which of the following refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?

Answer:

  • backdoor
  • Question 2: Malware that restricts access to a computer system by encrypting files or locking

the entire system down until the user performs requested action is known as:

Answer:

  • ransomware

Question 3: Which of the following is an example of spyware?

Answer:

  • keylogger

Question 4: Malicious software collecting information about users without their

knowledge/consent is known as:

Answer:

  • spyware

Question 5: Which of the following applies to a collection of intermediary compromised systems that can be used as a platform for a DDoS attack?

Answer:

  • botnet

Question 6: Which type of malware resides only in RAM?

Answer:

  • fileless virus
  • Question 7: Malicious code activated by a specific event is called:

Answer:

  • logic bomb

Question 8: Which of the following is an example of cryptomalware?

Answer:

  • ransomware

Question 9: What is the function of a C2 server?

Answer:

  • botnet control
  • Question 10: A collection of software tools used by a hacker to mask intrusion and obtain

administrator-level access to a computer or computer network is known as:

Answer:

  • rootkit

Question 11: What is a PUP? (Select 3 answers)

Answer:

  • application downloaded and installed with the user's consent (legal app)
  • type of computer program explicitly classified as malware by AV applications
  • type of free, utility software often bundled w/ paid app

correct: A, C, D

Question 12: Which type of Trojan enables unauthorized remote access to a compromised system?

Answer:

  • rat
  • Question 13: A malware-infected network host under remote control of a hacker is commonly

referred to as:

Answer:

  • bot
  • Question 14: A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities...

Answer:

  • true
  • Question 15: A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:

Answer:

  • worm

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

PDF Download FREE COMPUTERS AND STUDY GAMES ABOUT MALWARE QUIZ EXAM QUESTIONS Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -15 Questions and Answers -f...

UNLOCK ACCESS $11.99