Knowledge Mouse

Welcome to the Knowledge Mouse Online Quiz

Security+

Choose a quiz style:



You can also try another quiz or
create your own quiz (requires a PRO account).

Or learn about how to embed/host this quiz on your website

Questions Answers
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as: Malware
Which of the terms listed below refers to an example of a crypto-malware? Ransomware
A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called: Worm
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as: Ransomware
A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that True
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as: Rootkit
Which of the following answers lists an example of spyware? Keylogger

Quick Feedback for Knowledge Mouse

Want to suggest a feature? Report a problem? Suggest a correction? Please let Knowledge Mouse know below: