0
0
Cybersecurityknowledge~10 mins

Malware types (virus, worm, trojan, ransomware) in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to identify the malware type that replicates itself by attaching to files.

Cybersecurity
malware_type = "[1]"  # This malware attaches to files and spreads when files are shared
Drag options to blanks, or click blank then click option'
Aransomware
Bworm
Ctrojan
Dvirus
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing virus with worm, which spreads without attaching to files.
2fill in blank
medium

Complete the code to identify the malware type that spreads independently over networks.

Cybersecurity
malware_type = "[1]"  # This malware spreads by itself through network connections
Drag options to blanks, or click blank then click option'
Aransomware
Bvirus
Cworm
Dtrojan
Attempts:
3 left
💡 Hint
Common Mistakes
Mixing worm with virus, which requires a host file.
3fill in blank
hard

Fix the error in the code to correctly identify the malware type that disguises itself as legitimate software.

Cybersecurity
malware_type = "[1]"  # This malware pretends to be useful software but is harmful
Drag options to blanks, or click blank then click option'
Aworm
Btrojan
Cransomware
Dvirus
Attempts:
3 left
💡 Hint
Common Mistakes
Confusing trojan with virus or worm which replicate differently.
4fill in blank
hard

Fill both blanks to describe the malware type that encrypts files and demands payment.

Cybersecurity
malware_type = "[1]"  # This malware [2] files and asks for money to unlock them
Drag options to blanks, or click blank then click option'
Aransomware
Btrojan
Cencrypts
Ddeletes
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing 'deletes' instead of 'encrypts' for what ransomware does.
5fill in blank
hard

Fill all three blanks to create a dictionary mapping malware types to their main behavior.

Cybersecurity
malware_behaviors = {
  "virus": "[1]",
  "worm": "[2]",
  "trojan": "[3]"
}
Drag options to blanks, or click blank then click option'
Aattaches to files
Bspreads independently
Cdisguises as legit software
Dencrypts files
Attempts:
3 left
💡 Hint
Common Mistakes
Mixing behaviors between virus and worm.