1/19
Practice Test - All are multiple choice
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Malicious software designed to harm or exploit any programmable device
What is malware?
Trojan Horse
Which of the following is a type of malware that disguises itself as legitimate software?
It spreads through networks
What does a computer virus do?
Worm
Which type of malware is designed to replicate itself and spread to other computers?
Malware that locks files and demands payment for access
What is ransomware?
Spyware
Which type of malware secretly monitors user activity and collects personal information?
Malware that allows unauthorized access to a computer
What is a rootkit?
Provides free software updates
Which of the following is NOT a characteristic of adware?
A network of infected computers controlled by a hacker
What is a botnet?
Worm
Which type of malware is often used to create backdoors for hackers?
To record keystrokes and capture sensitive information
What is the primary purpose of a keylogger?
Rootkit
Which type of malware can modify system files to hide its presence?
A virus requires user action to spread, while a worm does not
What is the main difference between a virus and a worm?
Email attachments
Which of the following is a common method for distributing malware?
A method of tricking users into revealing personal information
What does the term "phishing" refer to?
Ransomware
Which type of malware is specifically designed to exploit vulnerabilities in software?
To appear as legitimate software while performing malicious actions
What is the purpose of a trojan horse?
Slow computer performance
Which of the following can be a sign of malware infection?
Regularly update software and use antivirus programs
What is the best way to protect against malware?
Adware
Which type of malware is often bundled with free software?