Malware Basics
Viruses
Anti-Virus Defenses
Trojans and Worms
Ransomware and Spyware
100

Malware is a combination of these two words.

What is malicious + software?

100

A computer virus typically attaches itself to one of these.

What is a host file (like a program file)?

100

This method compares a program’s binary pattern to a database of known malware.

What is signature detection?

100

A Trojan disguises itself as something helpful, much like this famous object from Greek mythology.

What is the Trojan Horse?

100

This type of malware locks or threatens to delete your files unless you pay money.

What is ransomware?

200

Many people call all malware this name, but technically that’s incorrect.

What is a virus?

200

Two common methods viruses spread are through these.

What are email attachments and backing storage devices (like USBs)?

200

This type of detection watches for suspicious behavior instead of known code.

What is heuristic detection?

200

Unlike viruses, Trojans do NOT do this.

What is self-replicate?

200

Businesses hit by ransomware may suffer more damage than the ransom itself, including this type of damage.

What is financial and reputational damage?

300

This class of malware can include viruses, Trojans, worms, and ransomware.

What is malware?

300

A virus that hides by inserting dummy code or rearranging itself is called this.

What is a stealth virus?

300

This method uses a mathematical hash of a file to see if it has been altered.

What is checksum verification?

300

This type of Trojan disables security or creates hidden ways for hackers to access a system.

What is a Backdoor Trojan?

300

This type of spyware records every keystroke a user enters.

What is a keylogger?

400

Malware can range from mild inconvenience to this extreme outcome.

What is crippling computer systems and widespread disruption?

400

This type of virus attacks the part of a disk used to start up a computer.

What is a boot sector virus?

400

This trade-off of anti-virus programs occurs because they constantly scan files in memory.

What is slower performance / resource drain?

400

Unlike viruses, worms don’t need a host file to spread; instead, they exploit these.

What are system vulnerabilities?

400

Criminals can secretly turn on these two built-in computer features to spy on users.

What are webcams and microphones?

500

nlike malware, this type of software is specifically designed to protect systems.

What is anti-virus (or anti-malware) software?

500

This famous virus waited for a specific calendar date before deleting all files.

What is the Friday the 13th virus?

500

SHA and MD5 are examples of these mathematical techniques used in checksum detection.

What are hashing algorithms?

500

Some worms don’t carry malicious code, but cause damage by doing this excessively.


    • What is replicating at a massive rate (using up memory, storage, or bandwidth)?

500

This low-tech method, used by Mark Zuckerberg, helps prevent webcam spying.

What is putting tape over the webcam?

M
e
n
u