Understanding Attack Vectors: A Method or Pathway Used by a Hacker to Access or Penetrate the Target System

This is a computer science engineering quiz on cybersecurity, which includes questions on attack vectors in cyber security.

download.jpg
Start Quiz

There are _________ types of computer virus.

5 7 10 12

Which of the following is not a type of virus?

Boot sector Polymorphic Multipartite Trojans

Which of them is not an ideal way of spreading the virus?

Infected website Emails Official Antivirus CDs USBs

In which year Apple II virus came into existence?

1979 1980 1981 1982

In mid-1981, the 1st virus for Apple computers with the name _________ came into existence.

Apple I Apple II Apple III Apple Virus

The virus hides itself from getting detected by ______ different ways.

2 3 4 5

_______________ infects the master boot record and it is challenging and a complex task to remove this virus.

Boot Sector Virus Polymorphic Multipartite Trojans

________________ gets installed & stays hidden in your computer’s memory. It stays involved to the specific type of files which it infects.

Boot Sector Virus Direct Action Virus Polymorphic Virus Multipartite Virus

Direct Action Virus is also known as ___________

Non-resident virus Boot Sector Virus Polymorphic Virus Multipartite Virus

______________ infects the executables as well as the boot sectors.

Non-resident virus Boot Sector Virus Polymorphic Virus Multipartite Virus

______________ are difficult to identify as they keep on changing their type and signature.

Non-resident virus Boot Sector Virus Polymorphic Virus Multipartite Virus

____________ deletes all the files that it infects.

Non-resident virus Overwrite Virus Polymorphic Virus Multipartite Virus

_____________ is also known as cavity virus.

Non-resident virus Overwrite Virus Polymorphic Virus Space-filler Virus

Which of the below-mentioned reasons do not satisfy the reason why people create a computer virus?

Research purpose Pranks Identity theft Protection

A computer ________ is a malicious code which self-replicates by copying itself to other programs.

Program

Virus

Application

Worm

Quiz/Test Summary
Title: Understanding Attack Vectors: A Method or Pathway Used by a Hacker to Access or Penetrate the Target System
Questions: 15
Contributed by:
james