8th Grade Malware Test

Is this your test? Login to manage it. If not, you can build a test just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
What might happen if the attacker sends the wrong data?
2.
4 points
Why do attackers usually target computers with the Windows Operating System? (Check all that apply)
3.
3 points
Which of the following are examples of malicious software? (Check all that apply)
4.
1 point
Legitimate requests cause an attack on the system.
5.
1 point
All malware can self-replicate.
6.
1 point
Some attackers use their victim's computers to store illegal files, to shift the liability away from the attackers.
7.
1 point
Write 3 things you can do to defend against a back door attack
8.
3 points
What are some things that might happen to your computer if you get a virus? Write three things.
9.
3 points
Where do the costs of damages from computer viruses come from? Write three examples.
10.
1 point
Front door attacks require the actions of a legitimate user.
11.
1 point
Server software listens for requests that arrive over the network, and attempt to satisfy these requests.
12.
1 point
When you run a program through a front door attack,
13.
2 points
Why might an illegitimate request not cause an attack? (Choose all that apply)
14.
3 points
How does Malware invade your computer? Write 3 ways.
15.
1 point
The term Malware comes from the words
16.
2 points
Which of the following must the attacker do to complete a buffer overflow attack? (Check all that apply)
17.
1 point
What do whitehat hackers do?
18.
1 point
A computer virus is a malicious program that
19.
1 point
Back door attacks target vulnerabilities in the hardware of your computer.
20.
1 point
Blackhat hackers look for flaws in software to exploit them, so they can tell the software companies what they need to fix.
21.
3 points
Write 3 things you can do to defend your computer against front foor attacks
22.
1 point
What is a "buffer overflow attack"?