2.Name the malware that infects the computer operating system.
3.Viruses is unfriendly to computer security system.
True
False
4.Hackers use this malware to steals your banking information.
5.Rootkit gives hacker the ability to access and control the target devices.
True
False
6.Phishing used mails to trick the user to download uncertified files for hacker to access their computer.
True
False
7.What is the name of this cyberattack that redirects you from a legitimate website to a fake website.
8.Which of these malware are used to lock target operating system.
Ransomware
Handsome
Drinksome
Mansome
9.What is the name of the malware that are eavesdropping or controlling target computer from far distance.
PokemonGo
Genshin Impact
Valorant
Spyware
10.What method of malware is it called to copy stolen credit card information to a new card.
{"name":"Malware", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"1.Identify the function of key-logger., 2.Name the malware that infects the computer operating system., 3.Viruses is unfriendly to computer security system.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}