Quiz: Malware

So many kinds of malware in the wild! From garden variety worms to hybrid viruses, you've got to watch out for Trojan horses, spyware, and social engineering -- and don't forget to secure that back door! The first line of defense is knowledge, understand the enemy and protect yourself. Take our quiz to find out how much you know about malicious code. Need to study first? Here's a printable glossary of common malware-related terms and their meanings.

Match the correct term in the left-hand column with its description in the right-hand column.

How to take the quiz:
- After reading the question, click on the answer that you think is correct to go to the whatis.com definition. If the answer you've chosen is correct, you will see the question text somewhere in the definition.
- After reading the question, write down the letter of your answer choice on scrap paper. Check your answers by using the answer key at the end of the quiz.

a) in the wild
b) anti-virus software
c) back door
d) hybrid virus
e) social engineering
f) logic bomb
g) Trojan horse
h) malware
i) data miner
j) denial of service
k) macro virus
l) adware
m) e-mail virus
n) ethical worm
o) executable
p) spyware
q) executable
r) zoo
s) DDoS attack
t) IM worm
u) payload
v) hybrid virus/worm
w) password cracker
x) probe
y) ethical worm
z) port scan
1._____ This is a type of software intended to deliver advertising, but quite often it tracks user behavior as well.

2. _____This is an attack in which multiple compromised systems attack a single target, causing users to be denied normal services.

3._____ This is a type of file containing a program to run its application; viruses are often transmitted this way.

4._____ This is a type of malware that is activated by some trigger, such as a specific date.

5. _____This is a controversial type of program used to automate security patching.

6. _____This is self-replicating malware that spreads through instant messaging networks.

7._____This is malicious coding that combines virus' ability to alter program code with the worm's ability to reside in live memory and to propagate without any action on the part of the user.

8._____This is a means of access to a computer system put in place by either an authorized person or a cracker.

9._____This is malware that is hidden within apparently harmless code to take the user by surprise. 10.____This is a non-technical approach to getting unauthorized access, usually by tricking silly humans into giving up their passwords.


See the rest of our quiz topics

ANSWER KEY: 1l;2s;3q;4f;5n;6t;7v;8c;9g;10e
Let us know how you did and suggest a topic for a future quiz! contactus@whatis.com

This was last updated in January 2011

Dig Deeper on Malware, virus, Trojan and spyware protection and removal

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.


File Extensions and File Formats