Security Quiz Review

Description

Quiz on Security Quiz Review, created by Rylan Blah on 12/11/2015.
Rylan Blah
Quiz by Rylan Blah, updated more than 1 year ago
Rylan Blah
Created by Rylan Blah over 8 years ago
503
1

Resource summary

Question 1

Question
Which of the following are parts of the attack surface?
Answer
  • Application
  • Network
  • Operating System
  • Hardware

Question 2

Question
Which of the following is the most difficult part of the attack surface to hack?
Answer
  • Application
  • Operating System
  • Network

Question 3

Question
Which of the following is the easiest part of the attack surface to hack?
Answer
  • Application
  • Operating System
  • Network

Question 4

Question
Population growth is a characteristic of ____________________________
Answer
  • Self Replicating Malware
  • Parasitic Malware
  • Logic Bombs

Question 5

Question
Logic Bombs are often
Answer
  • Self Replicating
  • Population Growth
  • Parasitic

Question 6

Question
A Trojan Horse is
Answer
  • Self Replicating
  • Population Growth
  • Parasitic

Question 7

Question
A Backdoor is likely
Answer
  • Self Replicating
  • Population Growth
  • Parasitic

Question 8

Question
A Virus is
Answer
  • Self-Replicating
  • Population Growth
  • Parasitic

Question 9

Question
Worms are
Answer
  • Self-Replicating
  • Population Growth
  • Parasitic

Question 10

Question
What are the three parts of a virus?
Answer
  • Infection Mechanism
  • Trigger
  • Payload
  • Replication Mechanism

Question 11

Question
For a Virus to be considered a Virus it must have an Infection Mechanism otherwise it could be considered a Logic Bomb.
Answer
  • True
  • False

Question 12

Question
A Rabbit can be which of the following
Answer
  • Worm
  • Fork Bomb
  • Virus

Question 13

Question
The population growth of a rabbit is either zero or very very aggressive.
Answer
  • True
  • False

Question 14

Question
Parasitic malware does not require some other executable code to exist and can simple use any file on the system.
Answer
  • True
  • False

Question 15

Question
How would Sun Tzu treat spies who spie on him?
Answer
  • He would have there head's chopped of because he is a savage.
  • He would in prison them.
  • He would treat them well, infact better than his enemy treats them to try and bring them to his side.

Question 16

Question
Static Analysis of a program/process involves.
Answer
  • Analyzing the program while the process is not running.
  • Analyzing the process while the program is running.
  • Analyzing the program while the process is running.

Question 17

Question
Dynamic Analysis involves analyzing the process while it is running.
Answer
  • True
  • False

Question 18

Question
To hide the true nature of something is too [blank_start]obfuscate[blank_end] it.
Answer
  • obfuscate

Question 19

Question
What are signs that a program has been packed.
Answer
  • Very few imports
  • Very small size
  • Lots of Strings

Question 20

Question
What are signs that a program has been obfuscated?
Answer
  • Very few Strings
  • Very few imports
  • The program has been packed
  • The size is very small
  • The program is bigger on disk than it's advertised size
Show full summary Hide full summary

Similar

CCNA Security Final Exam
Maikel Degrande
Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls
Security (1)
Daniel Freedman