Viruses and Worms
Ransomware
Malware
Security Protocols
Account Authentication
100

Which malware type can self-replicate with the assistance of a host system?

A. trojan

B. virus

C. worm

D. bot

B. virus

100

The primary goal of crypto-malware is to _____.

A. encrypt files to obtain cryptocurrency

B. slow down computer processes

C. secretly mine information and data

D. share files with other people

A. encrypt files to obtain cryptocurrency

100

Software that is designed to intentionally cause harm to a device, server, or network is _____.

A. outware

B. loggerware

C. attackware

D. malware

D. malware

100

What OSI Layer does Transport Layer Security (TLS) operate on?

A. Layer 5

B. Layer 6

C. Layer 4

D. Layer 8

B. Layer 6

100

What does a password vault use for secure encryption?

A. AES-128

B. SHA-128

C. AES-256

D. SHA-256

C. AES-256

200

Which malware type can replicate itself without the help of a host system or human interaction?

A. trojan

B. virus

C. worm

D. bot

C. worm

200

Which of the following is a type of ransomware?

A. Locker

B. Scareware

C. Doxware

D. All of the above

D. All of the above

200

Some examples of malware include:

A. robots, viruses, and worms

B. trojans, worms, and bots

C. computerware, worms, and robots

D. worms, system kits, and loggerware

B. trojans, worms, and bots

200

What is SFTP used for?

A. Security file training

B. Security format transfer

C. Secure file transfer

D. Secure file transport

C. Secure file transfer

200

_____ chips are built into the motherboard and used with Full Disk Encryption.

A. TPM

B. PTM

C. TDM

D. PDM

A. TPM

300

A computer virus attaches to _____ in order to execute malicious code.

A. another virus

B. a file, document, or program

C. a worm

D. a firewall

B. a file, document, or program

300

Which of the following ransomware is typically Android-based?

A. Locker

B. Leakware

C. Extortion-ware

D. None of the above

A. Locker

300

Viruses and worms can affect a system by _____.

A. deleting hard drives

B. slowing down the system

C. improving system functions

D. producing fake applications

B. slowing down the system

300

A VPN is an example of a secure protocol.

A. True

B. False

B. False

300

What does EAP stand for?

A. Environmental Act of Protection

B. Employee Assistance Program

C. Extensible Authentication Protocol

D. Encryption Authentication and Privacy

C. Extensible Authentication Protocol

400

What is a positive result a virus can have?

A. upgrade the operating system

B. convert software into a new version

C. fix problems in a system

D. stop the virus from replicating

C. fix problems in a system

400

Which type of ransomware can lock your computer and flood it with pop-up windows?

A. Freezeware

B. Scareware

C. Ware-wolf

D. POPware

B. Scareware

400

One tool that hackers use to get sensitive information from victims is/are _____.

A. loggerware

B. keyloggers

C. robots

D. phishing

B. keyloggers

400

What is one of the most popular key exchange protocols?

A. Key Exchange Protocol

B. Diffie Hellman Protocol

C. Secure Exchange Protocol

D. Encryption Exchange Protocol

B. Diffie Hellman Protocol

400

EAP-FAST was a replacement for which of the following?

A. EAP-SLOW

B. LEAP

C. EAP-RSA

D. REAP

B. LEAP

500

What type of virus comes bundled with an application?

A. program virus

B. boot sector virus

C. script virus

D. macro virus

A. program virus

500

Which ransomware seeks out public officials and celebrities to exploit?

A. Scareware

B. Doxware

C. Freezeware

D. None of the above

B. Doxware

500

Malware is a combination of which two words?

A. malevolent and software

B. malignant and software

C. maladapted and software

D. malicious and software

D. malicious and software

500

Which of the following is a secure protocol?

A. HTTP

B. HTTPS

C. FTP

D. NTP

B. HTTPS

500

What does PAP stand for?

A. Point-against-point

B. Procedure and protection

C. Person against person

D. Password Authentication Protocol

D. Password Authentication Protocol

M
e
n
u