865 538
Quiz by , created more than 1 year ago

malware and social engineering attacks

41
0
0
865 538
Created by 865 538 about 7 years ago
Close

nsf_02

Question 1 of 30

1

A ____ virus infects the Master Boot Record of a hard disk drive.

Select one of the following:

  • a. file infector

  • b. companion

  • c. resident

  • d. boot

Explanation

Question 2 of 30

1

____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.

Select one of the following:

  • a. Trojan

  • b. Adware

  • c. Spam

  • d. Keylogger

Explanation

Question 3 of 30

1

Like a virus, a worm needs the user to perform an action such as starting a program or opening an e-mail attachment to start the infection.

Select one of the following:

  • True
  • False

Explanation

Question 4 of 30

1

In a(n) ____ infection, a virus injects itself into the program’s executable code instead of at the end of the file.

Select one of the following:

  • a. split

  • b. Swiss cheese

  • c. appender

  • d. stealth

Explanation

Question 5 of 30

1

Removing a rootkit from an infected computer is extremely difficult.

Select one of the following:

  • True
  • False

Explanation

Question 6 of 30

1

Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.

Select one of the following:

  • True
  • False

Explanation

Question 7 of 30

1

A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.

Select one of the following:

  • a. logic bomb

  • b. metamorphic virus

  • c. Trojan

  • d. macro virus

Explanation

Question 8 of 30

1

A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.

Select one of the following:

  • a. rootkit

  • b. process

  • c. program

  • d. macro

Explanation

Question 9 of 30

1

A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.

Select one of the following:

  • a. boot

  • b. resident

  • c. file infector

  • d. companion

Explanation

Question 10 of 30

1

A(n) ____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program.

Select one of the following:

  • a. companion

  • b. metamorphic

  • c. macro

  • d. boot

Explanation

Question 11 of 30

1

A(n) ____ requires a user to transport it from one computer to another.

Select one of the following:

  • a. worm

  • b. rootkit

  • c. virus

  • d. adware

Explanation

Question 12 of 30

1

Which of these is NOT an action that a virus can take?

Select one of the following:

  • a. transport itself through the network to another device

  • b. cause a computer to crash

  • c. erase files from a hard drive

  • d. reformat the hard disk drive

Explanation

Question 13 of 30

1

Which malware locks up a user's computer and then displays a message that purports to come from a law enforcement agency?

Select one of the following:

  • a. virus

  • b. ransomware

  • c. worm

  • d. Trojan

Explanation

Question 14 of 30

1

Which of the following is an attempt to influence a user by coercion?

Select one of the following:

  • a. authority

  • b. social proof

  • c. intimidation

  • d. familiarity

Explanation

Question 15 of 30

1

A user who installs a program that prints out coupons but in the background silently collects herd passwords has installed a ____.

Select one of the following:

  • a. virus

  • b. worm

  • c. Trojan

  • d. logic bomb

Explanation

Question 16 of 30

1

What should you do completely remove a rootkit from a computer?

Select one of the following:

  • a. Flash the ROM BIOS.

  • b. Erase and reinstall all files in the WINDOWS folder.

  • c. Expand the Master Boot Record.

  • d. Reformat the hard drive and reinstall the operating system.

Explanation

Question 17 of 30

1

Which of these could NOT be defined as a logic bomb?

Select one of the following:

  • a. Erase all data if John Smith’s name is removed from the list of employees.

  • b. Reformat the hard drive three months after Susan Jones left the company.

  • c. Send spam email to all users in the company on Tuesday.

  • d. If the company’s stock price drops below $10, them credit Jeff Brown with 10 additional years of retirement credit.

Explanation

Question 18 of 30

1

What is it called when a user makes a typing error when entering a URL that takes him takes him to an imposter website?

Select one of the following:

  • a. URL variance

  • b. typo squatting

  • c. spell scraping

  • d. work hijacking

Explanation

Question 19 of 30

1

Which of these is a general term used for describing software that gathers information without the user's consent?

Select one of the following:

  • a. adware

  • b. spyware

  • c. scrapeware

  • d. pullware

Explanation

Question 20 of 30

1

Which statement regarding a keylogger is NOT true?

Select one of the following:

  • a. Hardware keepers are installed between the keyboard connector and computer keyboard USB port.

  • b. Software keyloggers are easy to detect.

  • c. Keyloggers can be used to capture passwords, credit card numbers, or personal information.

  • d. Software keyloggers can be designed to send captured information automatically back to the attacker through the Internet.

Explanation

Question 21 of 30

1

The preferred method today of bot herders for command and control of zombies is ____.

Select one of the following:

  • a. Internet Relay Chat (IRC)

  • b. botnets

  • c. Hypertext Transport Protocol (HTTP)

  • d. spam

Explanation

Question 22 of 30

1

A watering how attack is directed against ____.

Select one of the following:

  • a. wealthy individuals

  • b. attackers who send spam

  • c. all users of a large corporation

  • d. users who access a common website

Explanation

Question 23 of 30

1

____ sends phishing messages only to wealthy individuals.

Select one of the following:

  • a. Spear phishing

  • b. Target phishing

  • c. Microing

  • d. Whaling

Explanation

Question 24 of 30

1

What is unsolicited incoming messages called?

Select one of the following:

  • a. spim

  • b. spam

  • c. vishing

  • d. SMS phishing

Explanation

Question 25 of 30

1

Michelle pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Michelle performed?

Select one of the following:

  • a. aliasing

  • b. impersonation

  • c. hiring

  • d. duplicity

Explanation

Question 26 of 30

1

How can an attacker use a hoax?

Select one of the following:

  • a. By sending out a hoax, an attacker can convince a hat to read his email more often.

  • b. A hoax can convince a user that a bad Trojan is circulating and that grew should change how security settings.

  • c. A user who receives multiple hoaxes could contact house supervisor for help.

  • d. Hoaxes are not used but attackers today.

Explanation

Question 27 of 30

1

Which of these items retrieved through dumpster diving would NOT provide useful information?

Select one of the following:

  • a. calendars

  • b. memos

  • c. organizational charts

  • d. books

Explanation

Question 28 of 30

1

____ is following an authorized person through a secure door.

Select one of the following:

  • a. Tagging

  • b. Backpacking

  • c. Tailgating

  • d. Caboosing

Explanation

Question 29 of 30

1

Each of these is a reason why adware is scorned EXCEPT ____.

Select one of the following:

  • a. it displays the attacker's programming skills.

  • b. it can interfere with a user's productivity.

  • c. it displays objectionable content.

  • d. it can cause a computer to crash or slow down.

Explanation

Question 30 of 30

1

What is the term used for a attacker who controls multiple zombies in a botnet?

Select one of the following:

  • a. zombie shepherd

  • b. rogue IRC

  • c. bot herder

  • d. cyber-robot

Explanation