PDF Download
FREE COMPUTERS AND STUDY GAMES ABOUT MALWARE
QUIZ EXAM QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -15 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: Which of the following refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
Answer:
- backdoor
Question 2: Malware that restricts access to a computer system by encrypting files or locking
the entire system down until the user performs requested action is known as:
Answer:
- ransomware
Question 3: Which of the following is an example of spyware?
Answer:
- keylogger
Question 4: Malicious software collecting information about users without their
knowledge/consent is known as:
Answer:
- spyware
Question 5: Which of the following applies to a collection of intermediary compromised systems that can be used as a platform for a DDoS attack?
Answer:
- botnet
Question 6: Which type of malware resides only in RAM?
Answer:
- fileless virus
Question 7: Malicious code activated by a specific event is called:
Answer:
- logic bomb
Question 8: Which of the following is an example of cryptomalware?
Answer:
- ransomware
Question 9: What is the function of a C2 server?
Answer:
- botnet control
Question 10: A collection of software tools used by a hacker to mask intrusion and obtain
administrator-level access to a computer or computer network is known as:
Answer:
- rootkit
Question 11: What is a PUP? (Select 3 answers)
Answer:
- application downloaded and installed with the user's consent (legal app)
- type of computer program explicitly classified as malware by AV applications
- type of free, utility software often bundled w/ paid app
correct: A, C, D
Question 12: Which type of Trojan enables unauthorized remote access to a compromised system?
Answer:
- rat
Question 13: A malware-infected network host under remote control of a hacker is commonly
referred to as:
Answer:
- bot
Question 14: A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities...
Answer:
- true
Question 15: A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:
Answer:
- worm