Build Your Knowledge of Malicious Software & Other Threats
You'll test your knowledge of different categories of malicious and removal software.
Created Date
03.20.15
Last Updated
03.20.15
Viewed 141 Times
Create multiple-choice games on Wisc-Online and play them on our Chakalaka mobile app!
But that's not all! Explore educational games created by others. Simply search by category or enter agame code number and dive into a world of learning and fun.
Download the Chakalaka mobile app here:
Topics of this game:
-
Network and computer attacks prevent a business from operating. Which of the following is not a goal of a typical network or computer attacks against an organization's information systems?
-
Malicious software attaching itself to a file or program and relying on a host to replicate itself is broadly classified as a _____________.
-
Which of the following is NOT true about antivirus programs that base detection of infections on virus signatures?
-
Malicious software capable of duplicating itself and spreading without a host is broadly classified as a _____________.
-
What type of malicious software could theoretically infect every computer in the world in a short period of time?
-
Malicious software disguising itself as a useful program while performing other functions is broadly classified as a _____________.
-
Trojans often install backdoors and rootkits which ___________________.
-
Malicious software using well known ports is classified as a _____________.
-
This type of malicious software can send information to an attacker including: passwords, pins, and keystrokes.
-
This unwanted software determines a person's purchasing habits to send targeted advertisements and slow down the computer.
-
It's a difficult task to protect against new viruses, worms, trojans, and other unwanted software. What is the most effective way to protect your network and system?
-
Which of the following protection programs specializes in protecting against Spyware?
-
Which of the following protection programs specializes in protecting against Adware?
-
Which of the following protection programs is a popular, generalized antivirus program?
-
Which of these isn't a type of firewall used to protect computer networks and systems from potential attacks and threats?
User comments are currently unavailable. We apologize for the inconvenience and are working to restore this feature as soon as possible.