
Sign up to save your podcasts
Or
Part 9: Malware Threats and Analysis (15 Questions)
1. Which type of malware disguises itself as legitimate software to deceive users?
• A) Ransomware
• B) Spyware
• C) Trojan Horse
• D) Worm
Answer: C) Trojan Horse
2. What malware self-replicates without user intervention to spread across networks?
• A) Virus
• B) Worm
• C) Rootkit
• D) Spyware
Answer: B) Worm
3. Which malware encrypts a victim’s data and demands payment for decryption?
• A) Adware
• B) Ransomware
• C) Keylogger
• D) Spyware
Answer: B) Ransomware
4. What type of malware records a victim’s keystrokes to steal sensitive information?
• A) Adware
• B) Keylogger
• C) Rootkit
• D) Botnet
Answer: B) Keylogger
5. Which malware resides in a system’s kernel or firmware to maintain persistent access?
• A) Rootkit
• B) Worm
• C) Adware
• D) Trojan
Answer: A) Rootkit
6. Which malware exploits the Master Boot Record (MBR) to execute malicious code before the operating system loads?
• A) Fileless Malware
• B) Bootkit
• C) Worm
• D) Logic Bomb
Answer: B) Bootkit
7. Which type of malware embeds itself directly into system memory without creating permanent files?
• A) Rootkit
• B) Spyware
• C) Fileless Malware
• D) Ransomware
Answer: C) Fileless Malware
8. Which attack manipulates legitimate software to execute malicious code during runtime?
• A) DLL Injection
• B) Polymorphic Malware
• C) Ransomware
• D) Worm
Answer: A) DLL Injection
9. What technique allows malware to modify its code signature to evade detection?
• A) Obfuscation
• B) Polymorphism
• C) Heuristics
• D) Backdoor
Answer: B) Polymorphism
10. Which malware type connects infected devices to a central command-and-control (C2) server?
• A) Spyware
• B) Botnet
• C) Keylogger
• D) Adware
Answer: B) Botnet
11. What malware triggers malicious actions when predefined conditions are met?
• A) Rootkit
• B) Logic Bomb
• C) Worm
• D) Adware
Answer: B) Logic Bomb
12. Which of the following malware types is designed to generate unwanted advertisements?
• A) Spyware
• B) Ransomware
• C) Adware
• D) Trojan
Answer: C) Adware
13. What malware technique leverages PowerShell or WMI for stealth attacks without dropping executable files?
• A) Fileless Malware
• B) Rootkit
• C) Ransomware
• D) Botnet
Answer: A) Fileless Malware
14. Which attack method plants malicious code inside legitimate application updates?
• A) Supply Chain Attack
• B) Side-Channel Attack
• C) Zero-Day Attack
• D) Credential Stuffing
Answer: A) Supply Chain Attack
15. Which malware type encrypts data and demands ransom while threatening to leak sensitive information if payment isn’t made?
• A) Ransomware
• B) Scareware
• C) Cryptojacking
• D) Doxware
Answer: D) Doxware
Part 9: Malware Threats and Analysis (15 Questions)
1. Which type of malware disguises itself as legitimate software to deceive users?
• A) Ransomware
• B) Spyware
• C) Trojan Horse
• D) Worm
Answer: C) Trojan Horse
2. What malware self-replicates without user intervention to spread across networks?
• A) Virus
• B) Worm
• C) Rootkit
• D) Spyware
Answer: B) Worm
3. Which malware encrypts a victim’s data and demands payment for decryption?
• A) Adware
• B) Ransomware
• C) Keylogger
• D) Spyware
Answer: B) Ransomware
4. What type of malware records a victim’s keystrokes to steal sensitive information?
• A) Adware
• B) Keylogger
• C) Rootkit
• D) Botnet
Answer: B) Keylogger
5. Which malware resides in a system’s kernel or firmware to maintain persistent access?
• A) Rootkit
• B) Worm
• C) Adware
• D) Trojan
Answer: A) Rootkit
6. Which malware exploits the Master Boot Record (MBR) to execute malicious code before the operating system loads?
• A) Fileless Malware
• B) Bootkit
• C) Worm
• D) Logic Bomb
Answer: B) Bootkit
7. Which type of malware embeds itself directly into system memory without creating permanent files?
• A) Rootkit
• B) Spyware
• C) Fileless Malware
• D) Ransomware
Answer: C) Fileless Malware
8. Which attack manipulates legitimate software to execute malicious code during runtime?
• A) DLL Injection
• B) Polymorphic Malware
• C) Ransomware
• D) Worm
Answer: A) DLL Injection
9. What technique allows malware to modify its code signature to evade detection?
• A) Obfuscation
• B) Polymorphism
• C) Heuristics
• D) Backdoor
Answer: B) Polymorphism
10. Which malware type connects infected devices to a central command-and-control (C2) server?
• A) Spyware
• B) Botnet
• C) Keylogger
• D) Adware
Answer: B) Botnet
11. What malware triggers malicious actions when predefined conditions are met?
• A) Rootkit
• B) Logic Bomb
• C) Worm
• D) Adware
Answer: B) Logic Bomb
12. Which of the following malware types is designed to generate unwanted advertisements?
• A) Spyware
• B) Ransomware
• C) Adware
• D) Trojan
Answer: C) Adware
13. What malware technique leverages PowerShell or WMI for stealth attacks without dropping executable files?
• A) Fileless Malware
• B) Rootkit
• C) Ransomware
• D) Botnet
Answer: A) Fileless Malware
14. Which attack method plants malicious code inside legitimate application updates?
• A) Supply Chain Attack
• B) Side-Channel Attack
• C) Zero-Day Attack
• D) Credential Stuffing
Answer: A) Supply Chain Attack
15. Which malware type encrypts data and demands ransom while threatening to leak sensitive information if payment isn’t made?
• A) Ransomware
• B) Scareware
• C) Cryptojacking
• D) Doxware
Answer: D) Doxware