Malware Quizzes Online & Trivia

Think you know all about malware? You will be amazed at how many new things you could learn with malware quizzes online!

If you're always curious to learn new facts and trivia about malware, what better way to satisfy your hunger for knowledge than some awesome malware quizzes? Test yourself and share these malware quizzes with your friends and peers to find out who the real tech-wizard is!

Enhance your knowledge about a topic or learn something completely new by answering quiz questions. You can prepare for your next test, simply keep yourself updated or even get insights into creating awesome questions with these malware quizzes.

Made up of well-researched and interesting quiz questions, each and every malware quiz here can test your awareness and grasp of the subject. With detailed feedback for every answer, you can easily learn something new about malware with every question you attempt.

View results instantly and share them online with your network to get some serious bragging rights.
So, what are you waiting for? Take the ultimate malware quiz and check if you're the master of malware.

Related Topics


  • Which of the following malicious programs used social networking sites as its primary propagation platform?
    Which of the following malicious programs used social networking sites as its primary propagation platform?
    Koobface is a webworm that attacks Microsoft Windows, Mac OS X, and Linux platforms. This worm initially targeted users of networking websites like Facebook, Skype, Yahoo, Messenger, and e-mail websites, like Gmail, Yahoo Mail, and AOL mail. It also targets Myspace and Twitter. It can contaminate other devices on the same local network. It usually attempts to gather login information from social media platforms, as well as retrieval of any sensitive financial data. Koobface originally spread by delivering Facebook messages to people who are “friends” of a Facebook user whose computer had already been infected.

  • Which of the following malicious programs could activate itself on infected computers even before the Operating System?
    Which of the following malicious programs could activate itself on infected computers even before the Operating System?
    The answer to this is A. TDSS. This is a type of rootkit that may be placed in the operating system so that it will be able to download and execute the various viruses, malware, and other malicious programs into the computer. This will block various programs of the operating system from running until such time when the gadget cannot be used anymore. The hard disk drives will be full of programs and software that will be bad for the gadget in general. This can become highly problematic. This trojan may be prevented with the use of a right anti-virus software. There are various ones available but remember that once it is already in the operating system, it will be harder to remove.

  • Which of the following malicious programs propagated with the help of a previously-unknown technique involving Microsoft-signed digital certificates?
    Which of the following malicious programs propagated with the help of a previously-unknown technique involving Microsoft-signed digital certificates?
    Flame-flame: this advanced malware, spotted in 2012, was believed to have been developed by a nation state and used for espionage purposes. flame made use of a previously-unknown md5 collision attack to digitally sign malicious code with a fraudulent certificate that appeared to originate with microsoft. this technique allowed flame to infect computers through the windows update mechanism. source: crypto breakthrough shows flame was designed by world-class scientists by dan goodin (http://j.mp/t5revg)

  • What is "Stuxnet" and why it is considered the most lethal cyberweapon ever created?
    What is "Stuxnet" and why it is considered the most lethal cyberweapon ever created?
    The name "Stuxnet" is not the official name of this lethal virus and was given to it by the Kaspersky(Anti-virus) corporation, which first identified it in the eastern European country of Belarus. Stuxnet is believed to be the most devastating cyberweapon ever created in the short history of cyberspace. Antivirus corporation came to the conclusion that this virus is so sophisticated that it did not even have a single bug and every line of code, which were immense, was made to do something and targeted a special type of equipment rather than steal money or information. This could not be achieved by a corporation or a hacker group and thus resources needed to create such weapon could only be attained by a State. The special equipment that it targeted was a "PLC" which stands for the programmable logic unit which basically controls the tools in a industry. As the malware targets a PLC, now the question was which type of PLC it targets and after doing some intensive research they came to the result that it didn't even target type of PLC rather a single PLC made by Siemens.This surprised and confused the investigators at Kaspersky and they didn't reach any conclusion. However when they put it the geopolitical aspect going at that time into the equation then mist started to condense and they started to understand the whole situation. At the same time news was coming from IAEA that Iranian nuclear project has taken a hit due to some mechanical failure. This news made investigators think that maybe this is somehow connected to all this. When they filtered the regions where the virus has taken its most toll, then they were sure as it was the Persian country of "IRAN". Iran nuclear power plant at Natanz which was the prime facility to produce weapons-grade uranium was most hit because somehow centrifuges which contain the yellow cake as they call the "radioactive uranium" started rotating more than it should and started exploding one by one and took back the Iranian nuclear project by years. The Stuxnet virus targeted the Siemens made PLC which controlled the movement of the centrifuges and made some of them rotate too fast and some too slow thus jeopardizing the whole process. The virus was jointly developed by US and Israel as a part of a campaign to hold Iran from getting nuclear weapons.US, which didn't had any offensive cyber wing even created a separate cyber organ called " US cyber command" which was sanctioned by the US govt to carry out such attacks, however, it is believed that most of the coding work was done by Israel. However, the graveness of the situation was understood afterward when investigators came to know that the malware had even infected installations in the US and Homeland department was put on alert as even they didn't know about the Stuxnet project. Stuxnet is considered the most sophisticated malware ever created just due to the mere scale of its effectiveness and it did not affect the software rather the PLC's which today controls almost every industrial and commercial installation like Power grids, Traffic lights, ATM and every piece of machinery that is connected to the internet.  

  • Which of the following specimens was least likely to have been used for sending spam emails?
    Which of the following specimens was least likely to have been used for sending spam emails?
    Stuxnet-stuxnet: this advanced malware, discovered in 2011, was designed with the primary goal of disrupting functionality of industrial control systems (ics). it was used with this purpose in an attack against ics deployed in iran. stuxnets objectives were unlikely to have been furthered by sending spam email. in contrast, conficker (a.k.a. downup), waledac and torpig (a.k.a sinowal) included explicit spam-sending capabilities. source: w32.stuxnet dossier by nicolas falliere, liam o murchu and eric chien (http://j.mp/12trnvy)

  • How does a trojan horse virus spread?
    How does a trojan horse virus spread?
    A Trojan horse virus (often known simply as a Trojan), is unlike other viruses and worms as it does not self-replicate or reproduce by infecting other files. Instead, Trojans require a user to interact with it in some way, such as downloading and running a file from the Internet, or opening an e-mail attachment. Therefore, before a Trojan horse program can attack, it must first find a way to entice the victim to copy, download, and run it by appearing harmless. Then it spreads like wildfire throughout a user's computer system and other devices on the same network after its victim has unknowingly downloaded it.

  • What do malware authors use when they deploy codes that specifically target victims and lure them to malicious websites?
    What do malware authors use when they deploy codes that specifically target victims and lure them to malicious websites?
    Social engineering Phishing

  • Which malicious program cannot do anything until actions are taken to activate the file attached by the malware? 
    Which malicious program cannot do anything until actions are taken to activate the file attached by the malware? 
    VirusViruses are programs that replicates and attaches copies of itself to a file and only performs their purposes when a user takes action to run or launch the infected file. Therefore viruses cannot act independently without user action taken to activate the file infected by the virus.

  • Which of the following specimens was least likely to have been used in a state-sponsored, targeted attack?
    Which of the following specimens was least likely to have been used in a state-sponsored, targeted attack?
    (A) Citadel This crimeware platform, believed to have been derived from the Zeus codebase in 2012, is built primarily for commercial purposes. it has been used by attackers to derive direct financial benefits through spyware and ransomware means. 

  • Which of the following programs has been used most frequently to maintain access to compromised systems as part of targeted APT(advance persistent threat)-style campaigns?
    Which of the following programs has been used most frequently to maintain access to compromised systems as part of targeted APT(advance persistent threat)-style campaigns?
    (A) Poison ivy This remote access trojan (rat) was installed on compromised systems in the context of numerous targeted attacks in the context of advanced persistent threat (apt). one of the first publicly-discussed incidents of this kind involved a data breach at RSA, disclosed in 2011. the attackers were believed to have installed a poison ivy variant after gaining initial access. the rat was configured to communicate in a reverse-connect mode, allowing the attackers to remotely control the affected systems even despite firewall safeguards. source: anatomy of an attack by uri rivner.

  • What do malware authors use when they deploy codes that specifically target victims and lure them to malicious websites? (Choose all that apply)
    What do malware authors use when they deploy codes that specifically target victims and lure them to malicious websites? (Choose all that apply)
    Social engineering Phishing

  • Why does the Trend Micro Smart Protection Network (SPN) use in-the-cloud technologies for monitoring threats?
    Why does the Trend Micro Smart Protection Network (SPN) use in-the-cloud technologies for monitoring threats?
    It is faster to use Trend Micro’s updated solutions in the cloud, than to perform the daily updates on a machine to protect against the new Web threats of the day

Top Trending Quizzes
Which Character Are You From The Tiger's Curse?
Will A Chromebook Suite Me?
Art Quiz: Trivia On Principles Of Design
Who Is Your Celebrity Look A Like?
Great Game: Online Testing
How Country Am I?
A Fun Science Quiz For Children!
Online Test 1 Part 5
Can You Name The Following Extinct Animal?
Educational Interpreters: EIPA Written Pre-test
Liason History Quiz
Japanese Geography Trivia Quiz
How Do You Come Off As To People?
Geography Quiz About The British Isles!
What Movie Is Really About You?
Speak First Marking Period
Food Handler Course Practice Quiz!
Quiz On The Principles Of Art
Education And Use Of Technology
Who Is Your Tbd Match?
How Much Of A Contribution Do You Make To Society?
Science Form 3 Chapter 1 & 2-pop Quiz
Computer Terms Test
Business Profile - Quick Quiz
Foodie Quiz: How Much Of A Foodie Are You?
Art Knowledge Trivia Quiz
The Advanced Computer Quiz
Remedies Exam Revision 20 Questions
Television Trivia Quiz
What Movie Genre Do You Belong In?
Super Vijay Fan
How Much Do You Know About Yg Entertainment?
Which Ds Game Should You Get?
Quiz: Which Sport Suits Your Personality?
Which Animal Has A Message For You Today? A Personality Quiz
Harmony Quiz: The Order Of Sharps And Flats
What Quiz Should I Take? Personality Quiz
Shelving Book Test 3
Will You Be Successful?
The Journey Inside: How A Computer Works? Trivia Quiz
Quiz About Speak Book By Laurie Halse Anderson
Which Sa TV Program Character Are You?
What Male Popstar Are You?
Geography Quiz: Where Am I From?
How Black Country Are You?
Matching A Reference To The Resource Type
What Does The Food You Eat Say About You?
Musical Terms And Signs! Trivia Questions Quiz
Which Famous American Athlete Are You?
Science Form 3 Chapter 1 Minitest
I Can Guess If You Are Male Or Female