Malware November 29, 2023 Contents Results - #1. What term is used to describe software designed to harm or exploit computer systems? a) Freeware a) Freeware b) Malware b) Malware c) Shareware c) Shareware d) Spyware d) Spyware #2. 2. Which type of malware is designed to spread rapidly across a network by exploiting vulnerabilities? a) Worm a) Worm b) Trojan horse b) Trojan horse c) Spyware c) Spyware d) Ransomware d) Ransomware #3. 3. A piece of malware that disguises itself as legitimate software but performs malicious actions is known as a: a) Worm a) Worm b) Trojan horse b) Trojan horse c) Adware c) Adware d) Rootkit d) Rootkit #4. 4. What is the primary purpose of adware? a) Stealing sensitive information a) Stealing sensitive information b) Displaying unwanted advertisements b) Displaying unwanted advertisements c) Encrypting files for ransom c) Encrypting files for ransom d) Spreading across a network d) Spreading across a network #5. 5. Which type of malware is specifically designed to capture and transmit a user's keystrokes? a) Worm a) Worm b) Ransomware b) Ransomware c) Key logger c) Key logger d) Spyware d) Spyware #6. 6. What is the main characteristic of ransomware? a) Stealing data a) Stealing data b) Displaying advertisements b) Displaying advertisements c) Encrypting files c) Encrypting files d) Spreading rapidly across a network d) Spreading rapidly across a network #7. 7. A program that appears harmless but contains malicious code that can be activated at a later time is known as a: a) Virus a) Virus b) Worm b) Worm c) Logic bomb (when specific conditions are met, such as a particular date or time) c) Logic bomb (when specific conditions are met, such as a particular date or time) d) Rootkit d) Rootkit #8. 8. Which type of malware encrypts a user's files and demands payment for their release? a) Adware a) Adware b) Spyware b) Spyware c) Ransomware c) Ransomware d) Trojan horse d) Trojan horse #9. 9. What is a rootkit? a) Malicious software that spreads rapidly a) Malicious software that spreads rapidly b) Software that disguises itself as legitimate but is harmful b) Software that disguises itself as legitimate but is harmful c) Malware designed to capture keystrokes c) Malware designed to capture keystrokes d) Malware that hides its presence on a system d) Malware that hides its presence on a system #10. 10. The process of disguising the true nature of malicious code is known as: a) Encryption a) Encryption b) Obfuscation b) Obfuscation c) Decompilation c) Decompilation d) Compression d) Compression #11. 11. A type of malware that changes its characteristics over time to avoid detection is called: a) Polymorphic malware a) Polymorphic malware b) Adware b) Adware c) Keylogger c) Keylogger d) Worm d) Worm #12. 12. What is the purpose of a botnet? a) To encrypt files on a user's system a) To encrypt files on a user's system b) To spread rapidly across a network b) To spread rapidly across a network c) To perform distributed denial-of-service (DDoS) attacks c) To perform distributed denial-of-service (DDoS) attacks d) To display unwanted advertisements d) To display unwanted advertisements #13. 13. Which type of malware is specifically designed to spread from one computer to another through removable media? a) Spyware a) Spyware b) Worm b) Worm c) Trojan horse c) Trojan horse d) Ransomware d) Ransomware #14. 14. What is a dropper in the context of malware? a) Malware that drops advertisements on the user's desktop a) Malware that drops advertisements on the user's desktop b) A program that delivers and installs malicious code onto a system b) A program that delivers and installs malicious code onto a system c) Malware that drops files into a secure folder c) Malware that drops files into a secure folder d) A type of encryption used by malware d) A type of encryption used by malware #15. 15. A type of malware that modifies its code to avoid detection by antivirus programs is known as: a) Adaptive malware a) Adaptive malware b) Antigenic malware b) Antigenic malware c) Stealth malware c) Stealth malware d) Persistent malware d) Persistent malware #16. 16. What is the primary purpose of a logic bomb? a) To capture keystrokes a) To capture keystrokes b) To display unwanted advertisements b) To display unwanted advertisements c) To activate malicious code at a specific time or under specific conditions c) To activate malicious code at a specific time or under specific conditions d) To spread rapidly across a network d) To spread rapidly across a network #17. 17. What is a signature-based detection method used by antivirus software? a) Analyzing behavior patterns a) Analyzing behavior patterns b) Identifying unique characteristics in known malware b) Identifying unique characteristics in known malware c) Detecting changes in file sizes c) Detecting changes in file sizes d) Monitoring network traffic d) Monitoring network traffic #18. 18. Which of the following is NOT a common method of malware propagation? a) Social engineering a) Social engineering b) Exploiting software vulnerabilities b) Exploiting software vulnerabilities c) Physical access to the computer c) Physical access to the computer d) Distributed denial-of-service (DDoS) attacks d) Distributed denial-of-service (DDoS) attacks #19. 19. What is the purpose of sandboxing in the context of malware detection? a) To isolate and execute suspicious code in a controlled environment a) To isolate and execute suspicious code in a controlled environment b) To display advertisements on the user's screen b) To display advertisements on the user's screen c) To encrypt files on a user's system c) To encrypt files on a user's system d) To spread rapidly across a network d) To spread rapidly across a network #20. 20. A malicious program that changes its appearance or behavior to evade detection by antivirus software is known as: a) Stealthware a) Stealthware b) Metamorphic/ Plymorphic malware b) Metamorphic/ Plymorphic malware c) Adaptive malware c) Adaptive malware d) Trojan horse d) Trojan horse #21. 21. What is the main objective of a man-in-the-middle (MitM) attack? a) Encrypting files on a user's system a) Encrypting files on a user's system b) Intercepting and manipulating communication between two parties b) Intercepting and manipulating communication between two parties c) Displaying unwanted advertisements c) Displaying unwanted advertisements d) Spreading rapidly across a network d) Spreading rapidly across a network #22. 22. A type of malware that mimics the behavior of a legitimate program while performing malicious actions is called a: a) Worm a) Worm b) Trojan horse b) Trojan horse c) Keylogger c) Keylogger d) Ransomware d) Ransomware #23. 23. Which of the following is a common method of social engineering used by malware creators? a) Brute force attacks a) Brute force attacks b) Phishing emails b) Phishing emails c) Distributed denial-of-service (DDoS) attacks c) Distributed denial-of-service (DDoS) attacks d) Cross-site scripting (XSS) d) Cross-site scripting (XSS) #24. 24. What is a honeypot in the context of cybersecurity? a) A system designed to attract and detect malware a) A system designed to attract and detect malware b) Malware that disguises itself as a legitimate program b) Malware that disguises itself as a legitimate program c) A type of encryption used by malware c) A type of encryption used by malware d) Malware that encrypts files and demands payment d) Malware that encrypts files and demands payment #25. 25. The process of reverting a system to a previous state to remove malware infections is known as: a) Quarantine a) Quarantine b) Remediation b) Remediation c) Restoration c) Restoration d) Vaccination d) Vaccination #26. 26. Which type of malware is designed to modify its own code to avoid detection by antivirus programs? a) Polymorphic malware a) Polymorphic malware b) Adware b) Adware c) Ransomware c) Ransomware d) Keylogger d) Keylogger #27. 27. A type of malware that relies on human interaction to spread, often through deceptive emails, is known as: a) Worm a) Worm b) Trojan horse b) Trojan horse c) Virus c) Virus d) Rootkit d) Rootkit #28. 28. What is a drive-by download in the context of malware? a) A method of encrypting files on a user's system a) A method of encrypting files on a user's system b) A malware that spreads through removable media b) A malware that spreads through removable media c) Unintentional downloading of malware when visiting a website c) Unintentional downloading of malware when visiting a website d) A type of logic bomb d) A type of logic bomb #29. 29. The process of analyzing and reverse engineering malware to understand its functionality and behavior is known as: a) Sandbox analysis a) Sandbox analysis b) Code obfuscation b) Code obfuscation c) Malware analysis c) Malware analysis d) Social engineering d) Social engineering #30. 30. A type of malware that mimics legitimate software updates to deceive users is known as: a) Spoofware a) Spoofware b) Update hijacker b) Update hijacker c) Masquerade malware c) Masquerade malware d) Fake update malware d) Fake update malware Finish