Quiz: Malware

So many kinds of malware in the wild! From garden variety worms to hybrid viruses, you've got to watch out for Trojan horses, spyware, and social engineering -- and don't forget to secure that back door! The first line of defense is knowledge, understand the enemy and protect yourself.

This Content Component encountered an error

So many kinds of malware in the wild! From garden variety worms to hybrid viruses, you've got to watch out for Trojan horses, spyware, and social engineering -- and don't forget to secure that back door! The first line of defense is knowledge, understand the enemy and protect yourself. Take our quiz to find out how much you know about malicious code. Need to study first? Here's a printable glossary of common malware-related terms and their meanings.

Match the correct term in the left-hand column with its description in the right-hand column.

How to take the quiz:
- After reading the question, click on the answer that you think iscorrect to go to the whatis.com definition. If the answer you ve chosenis correct, you will see the question text somewhere in the defintion.
OR
- After reading the question, write down the letter of your answerchoice on scrap paper. Check your answers by using the answer key at theend of the quiz.

a) in the wild
b) anti-virus software
c) back door
d) hybrid virus
e) social engineering
f) logic bomb
g) Trojan horse
h) malware
i) data miner
j) denial of service
k) macro virus
l) adware
m) e-mail virus
n) ethical worm
o) executable
p) spyware
q) executable
r) zoo
s) DDoS attack
t) IM worm
u) payload
v) hybrid virus/worm
w) password cracker
x) probe
y) ethical worm
z) port scan
1._____ This is a type of software intended to deliver advertising, but quite often it tracks user behavior as well.

2. _____This is an attack in which multiple compromised systems attack a single target, causing users to be denied normal services.

3._____ This is a type of file containing a program to run its application; viruses are often transmitted this way.

4._____ This is a type of malware that is activated by some trigger, such as a specific date.

5. _____This is a controversial type of program used to automate security patching.

6. _____This is self-replicating malware that spreads through instant messaging networks.

7._____This is malicious coding that combines virus' ability to alter program code with the worm's ability to reside in live memory and to propagate without any action on the part of the user.

8._____This is a means of access to a computer system put in place by either an authorized person or a cracker.

9._____This is malware that is hidden within apparently harmless code to take the user by surprise. 10.____This is a non-technical approach to getting unauthorized access, usually by tricking silly humans into giving up their passwords.

**************************************************************************
SCROLL DOWN FOR ANSWER KEY

















See the rest of our quiz topics

ANSWER KEY: 1l;2s;3q;4f;5n;6t;7v;8c;9g;10e
Let us know how you did and suggest a topic for a future quiz! contactus@whatis.com

This was first published in January 2011

Glossary

'Quiz: Malware' is part of the:

View All Definitions

Dig deeper on Malware, Viruses, Trojans and Spyware

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close