Security+

Practice Quiz 1:

  1.  
    Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
    A. Adware B. Ransomware C. Spyware D. Malware
  2.  
    Which of the terms listed below refers to an example of a crypto-malware?
    A. Backdoor B. Keylogger C. Ransomware D. Rootkit
  3.  
    A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:
    A. Spyware B. Trojan C. Worm D. Spam
  4.  
    Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:
    A. Grayware B. Adware C. Spyware D. Ransomware
  5.  
    A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that
    A. False B. True
  6.  
    A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
    A. Spyware B. Backdoor C. Trojan D. Rootkit
  7.  
    Which of the following answers lists an example of spyware?
    A. Vulnerability Scanner B. Keylogger C. Computer Worm D. Packet Sniffer
Answer Key
Hide Answer Key

Security+ (Answer Key)

Practice Quiz 1:

  1.  
    Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
    A. Adware B. Ransomware C. Spyware D. Malware
  2.  
    Which of the terms listed below refers to an example of a crypto-malware?
    A. Backdoor B. Keylogger C. Ransomware D. Rootkit
  3.  
    A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:
    A. Spyware B. Trojan C. Worm D. Spam
  4.  
    Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:
    A. Grayware B. Adware C. Spyware D. Ransomware
  5.  
    A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that
    A. False B. True
  6.  
    A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
    A. Spyware B. Backdoor C. Trojan D. Rootkit
  7.  
    Which of the following answers lists an example of spyware?
    A. Vulnerability Scanner B. Keylogger C. Computer Worm D. Packet Sniffer

Quick Feedback for Knowledge Mouse

Want to suggest a feature? Report a problem? Suggest a correction? Please let Knowledge Mouse know below: