Ch 2 - Malware & Social Engineering

Beschreibung

Ch 2 quiz
C Danvers
Quiz von C Danvers, aktualisiert more than 1 year ago
C Danvers
Erstellt von C Danvers vor etwa 6 Jahre
729
0

Zusammenfassung der Ressource

Frage 1

Frage
A polymorphic virus changes its internal code to one of a set number of predefined mutations whenever it is executed.
Antworten
  • True
  • False

Frage 2

Frage
A remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols.
Antworten
  • True
  • False

Frage 3

Frage
A rootkit can hide its presence, but not the presence of other malware.
Antworten
  • True
  • False

Frage 4

Frage
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
Antworten
  • A macro
  • A program
  • A rootkit
  • A process

Frage 5

Frage
A virus self-replicates on the host computer and spreads to other computers by itself.
Antworten
  • True
  • False

Frage 6

Frage
A virus that infects an executable program file is known as?
Antworten
  • boot sector virus
  • program virus
  • macro virus
  • companion virus

Frage 7

Frage
How many different Microsoft Windows file types can be infected with a virus?
Antworten
  • 60
  • 80
  • 50
  • 70

Frage 8

Frage
Malware is software that enters a computer system with the user's knowledge or consent and then performs an unwanted and harmful action.
Antworten
  • True
  • False

Frage 9

Frage
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
Antworten
  • stealware
  • lock-ware
  • hostageware
  • ransomware

Frage 10

Frage
Once the malware reaches a system through circulation, then it must embed itself into that system.
Antworten
  • True
  • False

Frage 11

Frage
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?
Antworten
  • appender
  • swiss cheese
  • split
  • stealth

Frage 12

Frage
Phishing is sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.
Antworten
  • True
  • False

Frage 13

Frage
Select below the type of malware that appears to have a legitimate use, but contains something malicious:
Antworten
  • trojan
  • script
  • virus
  • worm

Frage 14

Frage
Select the term used to describe tracking software that is deployed without the consent or control of the user.
Antworten
  • trojan
  • botnet
  • malware
  • spyware

Frage 15

Frage
Social engineering impersonation means to masquerade as a real or fictitious character and then play out the role of that person on a victim.
Antworten
  • True
  • False

Frage 16

Frage
Two types of malware have the primary trait of circulation. These are viruses and worms.
Antworten
  • True
  • False

Frage 17

Frage
Vishing is a false warning, often contained in an email message claiming to come from the IT department.
Antworten
  • True
  • False

Frage 18

Frage
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
Antworten
  • adware
  • trojan
  • keylogger
  • spam

Frage 19

Frage
What social engineering principal convinces a victim an immediate action is needed?
Antworten
  • authority
  • intimidation
  • urgency
  • scarcity

Frage 20

Frage
What social engineering principal frightens and coerces a victim by using threats?
Antworten
  • authority
  • scarcity
  • urgency
  • intimidation

Frage 21

Frage
What specific science discipline do most social engineering attacks rely on when they are being used?
Antworten
  • psychology
  • engineering
  • criminology
  • psychiatry

Frage 22

Frage
What specific type of phishing attack uses the telephone to target a victim?
Antworten
  • spear phishing
  • whaling
  • target phising
  • vishing

Frage 23

Frage
What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?
Antworten
  • phreaking
  • social engineering
  • hacking
  • reverse engineering

Frage 24

Frage
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?
Antworten
  • typo squatting
  • adware
  • spam
  • watering hole

Frage 25

Frage
What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it?
Antworten
  • logic bomb
  • script
  • macro virus
  • metamorphic virus

Frage 26

Frage
What type of malicious software technology is used to download and install software without the user's interaction?
Antworten
  • automated software
  • system modifying software
  • automatic download software
  • tracking software

Frage 27

Frage
What type of malicious software technology is used to monitor user behavior or gather information about the user, sometimes including personally identifiable or other sensitive information?
Antworten
  • automated software
  • system modifying software
  • tracking software
  • automatic download software

Frage 28

Frage
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as a virus?
Antworten
  • wrapper
  • rootkit
  • backdoor
  • shield

Frage 29

Frage
What type of malware is heavily dependent on a user in order to spread?
Antworten
  • rootkit
  • worm
  • virus
  • trojan

Frage 30

Frage
What type of ransomware displays a screen and prevents the user from accessing the computer's resources?
Antworten
  • standard ransomware
  • locking-malware
  • crypto-malware
  • blocker ransomware

Frage 31

Frage
What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's device?
Antworten
  • locking-malware
  • blocker ransomware
  • crypto-malware
  • standard ransomware

Frage 32

Frage
What type of software can be installed in an individual's web browser to prevent ads from displaying
Antworten
  • cookie scanning
  • ad blocking
  • ad sensing
  • antivirus

Frage 33

Frage
What type of spyware silently captures and stores each keystroke that a user types on the computer's keyboard?
Antworten
  • ransomware
  • key indexing
  • passive tracking
  • keylogger

Frage 34

Frage
What type of structure is used to provide instructions to infected bot computers?
Antworten
  • client-server
  • bot herder
  • hive
  • command & control

Frage 35

Frage
What type of system security malware allows for access to a computer, program, or service without authorization?
Antworten
  • command & control
  • backdoor
  • botnet
  • zombie

Frage 36

Frage
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks?
Antworten
  • bug
  • Easter egg
  • Trojan horse
  • virus

Frage 37

Frage
Which of the following are considered to be the primary payload capabilities found in malware? (Choose all that apply.)
Antworten
  • modify data
  • collect data
  • launch attacks
  • delete data

Frage 38

Frage
Which of the following is malicious computer code that reproduces itself on the same computer?
Antworten
  • worm
  • adware
  • spyware
  • virus

Frage 39

Frage
Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trait that the malware possesses?
Antworten
  • concealment
  • source
  • circulation
  • infection

Frage 40

Frage
Which type of phishing attack targets specific users?
Antworten
  • vishing
  • target phishing
  • whaling
  • spear phishing
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CCNA Security 210-260 IINS - Exam 3
Mike M
Application of technology in learning
Jeff Wall
Innovative Uses of Technology
John Marttila
Ch1 - The nature of IT Projects
mauricio5509
The Internet
Gee_0599
SQL Quiz
R M
CCNA Answers – CCNA Exam
Abdul Demir
Professional, Legal, and Ethical Issues in Information Security
mfundo.falteni
System Analysis
R A
Flash Cards Networks
JJ Pro Wrestler
EDUC260- Multimodal Literacies for a Digital Age
angelwoo2002