We welcome you to the fundamentals of malware awareness. The quiz contains questions about malware threats and management. Do you think you can ace this super fun quiz with flying colors? Please make sure to read all the questions very carefully before answering. This fun quiz will brush your memory about the concept and test your knowledge. So, make sure See moreto attempt it well. All the questions in the quiz are compulsory. There is no time bar. You can take this quiz as many times as you like. Good Luck!
Viruses
Social engineering
Rogue anti-spyware
Phishing
Rate this question:
Spam
File infector families
Phishing
Worms
Rate this question:
Image Spam
Enhanced attachments
Timely subject headings
Rogue anti-spyware
Rate this question:
Botnet applications are untraceable
Botnets are inherently difficult to identify
Talented IT professionals in countries with organized crime develop botnets
Many users are unaware that their system has been compromised
Rate this question:
They originate from outside the network
They use or damage computer resources.
They enter computer systems, usually without the user’s knowledge or intent.
They release hidden payloads designed to damage hard drives and corrupt data files
Rate this question:
They appear to be harmless but hide malicious intent.
They are not intended to cause harm and only make fun of the user.
They replicate and attach themselves to host files.
They do not require user intervention to spread or function.
Rate this question:
Worms do not replicate.
Worms do not spread to other computer systems.
Worms do not require a host file to spread.
Worms do not carry payloads.
Rate this question:
Create a copy of itself in a directory
Create a registry entry
Get email addresses
Executes a program
Rate this question:
Lost productivity, recovery and cleanup costs, lost data, and damaged reputations
Lost productivity, increased vulnerability to future virus attacks, loss of confidential data, loss of other data
Network downtime, decreased availability of computer resources, disk damage, and problems in virus isolation
Network disconnection, increased errors in the network, and damaged reputation due to loss of customer data
Rate this question:
Adware
Browser Helper Object
Keylogger
Trackware
Rate this question:
Browser Helper Object
Keylogger
Keygen
Spyware
Rate this question:
Spyware
Dialer
Hacking Tool
Joke Program
Rate this question:
Additional programs are also being installed at the time of installation
ActiveX is being used as an installer
A Browser Helper Object (BHO) plug-in gets installed on the browser
The browser security settings remain the same
Rate this question:
Advertising banners are displayed
The computer performs an auto-restart
The system becomes unstable
The computer disconnects from the Internet
Rate this question:
The message could contain malware attachments that cause problems if the user clicks on it.
The message may be delayed.
The error may actually be a Man-in-the-Middle attack.
The email message automatically poses a threat.
Rate this question:
The user is asked to click on an attachment to view false account information.
The user will not be able to identify the threat.
The user is asked to click on a link that takes them to a site intended to get account information.
The user downloads account software and infects the computer with malware.
Rate this question:
Accusatory
Free Stuff
Generic Conversations
Virus Alert
Rate this question:
Graphical User Interface (GUI)
A captcha
A browser plug-in
Adware pop-up
Rate this question:
Email address
Greeting does not have a first and last name
Typing errors in the messages from businesses
Alarmist tone in the message
Rate this question:
That is where the threats are located
Threats can be scanned more quickly there
The technologies are developed for in-the-cloud locations
It is faster to use Trend Micro’s updated solutions in the cloud, than to perform the daily updates on a machine to protect against the new Web threats of the day
Rate this question:
File reputation technology
Web reputation technology
Email reputation technology
Correlation technology
Rate this question:
HouseCall Server Edition
Mobile Security
OfficeScan
Network VirusWall Enforcer
Rate this question:
Firewall settings
Internet connection
Website reputation
URL validity
Rate this question:
Web pages with unwanted content
Web pages that require too much bandwidth
Web pages with downloads
Web pages with hidden threats
Rate this question:
Quiz Review Timeline (Updated): Aug 31, 2023 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.