Malware Quizzes & Trivia
A comprehensive database of malware quizzes online, test your knowledge with malware quiz questions. Our online malware trivia quizzes can be adapted to suit your requirements for taking some of the top malware quizzes.
A little quiz to test your knowledge of our lesson today!
Questions: 8 | Attempts: 1979 | Last updated: Nov 22, 2019
Sample QuestionWhich malicious program cannot do anything until actions are taken to activate the file attached by the malware.
Do your malware analysis or reverse-engineering skills need a tune-up? Take this quck quiz to assess your skills and perhaps learn something new in the process. Just because you're curious. The quiz is not meant to be...
Questions: 10 | Attempts: 1304 | Last updated: Apr 6, 2015
Sample QuestionWhat are the two most common phases of malware analysis?
Think you know malware? See whether you can recognize the 10 malware specimens you should know by name and learn something new along the way. This fun quiz has been brought to you by SANS...
Questions: 10 | Attempts: 986 | Last updated: Jan 11, 2018
Sample QuestionWhich of the following specimens was among the first viral programs in existence, residing in memory of affected Apple II computers and infecting the boot sector of floppy disks?
Quiz contains fundamental questions related to malware. Reference from Trendmicro, Inc. documentation on Fundamentals of Malware Awareness.
Questions: 25 | Attempts: 220 | Last updated: Jan 11, 2018
Sample QuestionWhat aspect of the threat landscape is most related to infrastructure vulnerabilities?
Which of the following malicious programs used social networking sites as its primary propagation platform?
Koobface is a webworm that attacks Microsoft Windows, Mac OS X, and Linux platforms. This worm initially targeted users of networking websites like Facebook, Skype, Yahoo, Messenger, and e-mail websites, like Gmail, Yahoo Mail, and AOL mail. It also
Which of the following malicious programs could activate itself on infected computers even before the Operating System?
The answer to this is A. TDSS. This is a type of rootkit that may be placed in the operating system so that it will be able to download and execute the various viruses, malware, and other malicious programs into the computer. This will block various
Which of the following malicious programs propagated with the help of a previously-unknown technique involving Microsoft-signed digital certificates?
Flame-flame: this advanced malware, spotted in 2012, was believed to have been developed by a nation state and used for espionage purposes. flame made use of a previously-unknown md5 collision attack to digitally sign malicious code with a fraudulent
What is "Stuxnet" and why it is considered the most lethal cyberweapon ever created?More
The name "Stuxnet" is not the official name of this lethal virus and was given to it by the Kaspersky(Anti-virus) corporation, which first identified it in the eastern European country of Belarus. Stuxnet is believed to be the most dev