This is the first quiz about the threats to systems, data & information subtopic. All 15 questions in this quiz are covered in the articles.
Every question in this quiz is multiple choice. In order to take this quiz, click on the box for your selected answer. Once you have tried your best attempt, you can click on the 'Submit answers' button and your answers will be marked. The questions highlighted in green are the ones you answered correctly and the questions highlighted in red are the ones you answered incorrectly. This will give you an overview of the terminology that you can remember and the terminology that you could not remember. You could also consider whether the questions you answered correctly were ones you definitely thought you knew or ones you guessed. If you want to have another go at the quiz, you can reload the page.
Once you've finished the quiz, you can click on 'Reveal/Hide answers' to reveal or hide the correct answers for every question. The correct answer is explained for most questions.
Remember to click on 'Submit answers' once you have finished this quiz in order to get your result.
Question 1
The correct answer is: b: A Trojan horse
A Trojan horse, often shortened to a Trojan, is a type of malware that disguises itself as a safe and legitimate program when it actually performs malicious tasks.
Options A and C are incorrect as these are not types of malware. A PUP is a type of program that is not strictly malicious, but may be unwanted for the user. Also, riskware is not strictly malicious, but poses a risk to the user in some way.
Question 2
The correct answer is: b: Infected computers try to automatically copy it to other computers.
Spyware is not self-replicating, meaning that infected computers do not automatically copy it to other computers.
Options A, C, and D are all true statements about spyware.
Question 3
The correct answer is: a: A brute-force attack
A brute-force attack is a type of cyberattack where the attacker repeatedly submits large numbers of passwords in the hope of discovering the correct password.
Question 4
The correct answer is: a: True
Viruses are a self-replicating type of malware that insert their code into other programs to copy themselves and spread to other devices.
Question 5
The correct answer is: c: A worm
A computer worm is a type of malware that automatically spreads itself over a network and infects other computers without any interaction from the creators.
Question 6
The correct answer is: a: True
Not all hacking is malicious. Some people test systems for security holes by trying to gain access. This is known as white hat hacking or ethical hacking. There are even 'bounties' paid to white hat hackers that correctly detect security holes in websites, software, and networks, and report them to the organisation that developed it.
Question 7
The correct answer is: d: Through HTML files
It is not possible for HTML files to contain a virus or malware, since HTML is literally 'plain text with formatting'.
Options A, B, and C are all examples of ways that viruses and malware spread.
Question 8
The correct answer is: d: All of the above
Rootkits are one of the most serious types of malwares, since a rootkit can modify anything that someone with root or administrator access can.
Question 9
The correct answer is: b: Programming errors
Vulnerabilities are unintentional flaws caused by programming errors or improper configuration that can lead to viruses, worms, Trojan horses, or other malicious code running in the software program, operating system, website, web browser, hardware, or firmware.
Options A and C are incorrect as they are ways of protecting systems and networks.
Option D is incorrect as that is a consequence of a zero-day vulnerability that has been exploited.
Question 10
The correct answer is: a: Trojan horse
A Trojan horse, often shortened to a Trojan, is a type of malware that disguises itself as a safe and legitimate program when it actually performs malicious tasks in order to trick users into opening and running it.
Question 11
The correct answer is: d: Continuous dramatic notifications and popups.
Rogue security software is a type of malware that tricks users into thinking they have viruses or malware on their computers when they actually don't and misleads them with fake detections and alerts.
Options A, B, and C are incorrect as they are features of legitimate antivirus software.
Question 12
The correct answer is: c: Loss of important and valuable data.
Ransomware is a type of malware that blocks access to a computer system or files until a sum of money is paid. Ransomware may encrypt your personal files so that they are inaccessible or even completely lock you out of your computer.
Options A and B are incorrect. Although ransomware can also come with these effects, they are not as likely.
Option D is incorrect as ransomware is simply a piece of malicious code and cannot physically damage a computer.
Question 13
The correct answer is: b: A network of hijacked computers infected with malware that are controlled by a single attacking party.
Question 14
The correct answer is: b: False
Malware is rarely limited to a specific country and often spreads to computers all around the world.
Question 15
The correct answer is: c: Sending a copy of a malicious email attachment to thousands of users at once.
With untargeted cyberattacks, the attacker is not targeting a specific individual or organisation. The attacker is looking to exploit vulnerabilities in software code or use social engineering tactics to target large numbers of people in general.
Options A, B, and D are incorrect as they are all examples of targeted cyberattacks.
Your like or dislike has been added successfully. To see the changes, reload the page.