Question 1
Question
Which of the following is an advantage of Spy Sweeper over Spyware Doctor?
Answer
-
Spy Sweeper is simply more effective than Spyware Doctor.
-
Spy Sweeper is less expensive than Spyware Doctor.
-
Spy Sweeper has more shield options than Spyware Doctor.
-
Only Spy Sweeper catches adware as well as spyware.
Question 2
Question
What effect did the util-linux Trojan horse of 1999 have?
Answer
-
It used IRC to open a back door to the machine
-
It sent out login information of users logging in
-
It opened up port 1294 for a hacker to use
-
It deleted or corrupted the registry
Question 3
Question
What is the purpose of a Trojan horse?
Question 4
Question
Why should downloads of files be restricted to the IT department?
Answer
-
To permit the IT department access to employees’ computers.
-
To prevent access to the organization’s network by malicious software.
-
To centralize billing and payment for downloads.
-
To keep track of what is installed on network computers.
Question 5
Question
Why is blocking pop-up ads good for security?
Answer
-
Pop-up ads can corrupt memory on your system
-
Pop-up ads can be a vehicle for hackers to get into your system
-
Pop-up ads can be a vehicle for spyware or adware to get into your system
-
Pop-up ads reduce productivity
Question 6
Question
Which adware product is involved in suing anti-spyware companies?
Answer
-
SpySweeper
-
Spybot
-
RedSheriff
-
Gator
Question 7
Question
Which is one of the most famous Trojan horses?
Answer
-
Dropper
-
NetBus
-
Back Orifice
-
Util-Linux
Question 8
Question
Why are hidden file extensions a security threat?
Answer
-
User cannot properly organize their systems without knowing accurate file extensions.
-
Virus scanners have trouble with files whose extensions are hidden.
-
User might download an image that is really a malicious executable.
-
Hidden extensions almost always indicate a worm.
Question 9
Question
Which of the following are the two most common things Trojan horse programs do?
Answer
-
Launch DDoS attacks and open back doors
-
Install spyware and launch Ping of Death attacks
-
Hijack the home page and delete registry keys
-
Delete registry keys and alter system files
Question 10
Question
Why should users be cautious of hidden file extensions?
Answer
-
The files are usually executable.
-
They often are used to hide Trojan horses.
-
The wrong application is likely to open.
-
They make it difficult to establish file-application associations.
Question 11
Question
Which of the following is NOT an effective means of protecting against spyware?
Answer
-
Block scripts, applets, and other active programming in the Web browser.
-
Never download any attachment unless expecting it or certain it is safe.
-
Block all browser cookies or limit their duration.
-
Download files and programs to a separate folder until they are verified safe.
Question 12
Question
What is RedSheriff?
Answer
-
Adware that is downloaded automatically when you visit certain Web sites.
-
Spyware that gathers information about you when you visit a web site
-
Adware that is often attached to free programs found on the Internet.
-
Spyware that gets banking information from your hard drive
Question 13
Question
Which of the following most accurately explains why minimum necessary privileges for a user help protect against Trojan horses?
Answer
-
If the user cannot install programs, it is less likely that he will install a Trojan horse.
-
If a user cannot remove programs, then he cannot remove anti-spyware and antivirus software accidentally.
-
If the user cannot install programs, it is completely impossible that he will install a Trojan horse.
-
If the user cannot remove programs, he cannot alter the security settings you have put on his machine.
Question 14
Question
The filename mypic.jpg.exe is an example of a(n):
Answer
-
JPEG image file.
-
executable image.
-
computer virus.
-
hidden file extension.
Question 15
Question
Which is a product for identifying and removing spyware and adware?
Answer
-
RedSheriff
-
Webroot
-
Spy Sweeper
-
Gator
Question 16
Question
Manually removing spyware usually requires all but which of the following actions?
Answer
-
Reinstalling Windows
-
Reinstalling antivirus software
-
Formatting the hard drive
-
Removing keys from the registry
Question 17
Question
What does Back Orifice do to a system?
Answer
-
Provides a remote user complete administrative access to the machine
-
Deletes or corrupts Microsoft Office applications
-
Launches a DDoS at Microsoft sites
-
Installs a virus on the infected system
Question 18
Question
NetBus, Back Orifice and most similar Trojan horses are removed from an infected computer system by:
Answer
-
scanning the system with anti-spyware software.
-
installing a personal firewall.
-
scanning the system with an antivirus scanner.
-
editing the registry.
Question 19
Question
What did the util-linux Trojan horse do in 1999?
Answer
-
It prevented infected computers from accessing the Internet.
-
It deleted essential operating system files from network computers.
-
It captured log on information from infected computers to send to its creator.
-
It gained access to infected computers by deleting log on restrictions.
Question 20
Question
What is the purpose of spyware?
Answer
-
To manage popups and prevent nuisance advertising.
-
To monitor a system, gain access to log on information, and allow access to from the outside.
-
To monitor a system, gather information, and make it available to another.
-
To prevent others from detecting the presence of your computer on the network.
Question 21
Question
What does adware do?
Answer
-
It prevents users from blocking online popups while browsing the Internet.
-
It monitors user’s activities to provide targeted advertising while surfing the Internet.
-
It creates popup advertising directly on the user’s machine.
-
It downloads popup advertising within the Web browser.
Question 22
Question
Which is spyware loaded from a Web page via Java and purported to be a simple marketing tool?
Answer
-
Webroot
-
Spybot
-
SpySweeper
-
RedSheriff
Question 23
Question
Why would you want to restrict cookies?
Answer
-
Cookies consume system memory.
-
Cookies take up hard drive space.
-
Cookies are often infected with a virus.
-
Any Web site can read any cookie.
Question 24
Question
Which is NOT a likely symptom of a Trojan horse infection?
Answer
-
CD-ROM and other devices seem to work on their own.
-
Passwords, usernames, or accounts change.
-
Browser home page changes.
-
Clock time is incorrect.
Question 25
Question
Which of the following is an advantage of Spyware Doctor over Spy Sweeper?
Answer
-
Spy Sweeper is simply more effective than Spyware Doctor.
-
Only Spy Sweeper catches adware as well as spyware.
-
Spy Sweeper has more shield options than Spyware Doctor.
-
Spy Sweeper is less expensive than Spyware Doctor.
Question 26
Answer
-
Spyware that gathers information about you when you visit a web site
-
Adware that is downloaded automatically when you visit certain Web sites.
-
Spyware that gets banking information from your hard drive
-
Adware that is often attached to free programs found on the Internet.
Question 27
Question
Which Trojan horse is a small, self-installing remote administration system that permits a user to control the infected system across a TCP/IP connection?
Answer
-
Spybot
-
NetBus
-
Dropper
-
Back Orifice
Question 28
Question
Which of the following is the most insidious aspect of Back Orifice?
Question 29
Question
What is the best approach to preventing systems from being exploited by a Trojan horse?
Question 30
Question
Which is probably the most frequent action of Trojan horse attacks?
Answer
-
Searching for personal information.
-
Installing spyware and malware.
-
Installing back doors and executing DoS attacks.
-
Erasing files on a computer.
Question 31
Question
Which remote administration tool only operates on port 20034?
Answer
-
Spybot
-
Back Orifice
-
NetBus
-
Portal of Doom
Question 32
Question
What was the worst aspect of the Internet Explorer Trojan horse of 2003?
Answer
-
It deleted system files
-
It corrupted the registry.
-
There was no patch for it.
-
The path for it had security flaws.
Question 33
Question
Which of the following is the most likely reason you might wish to restrict Java applets?
Answer
-
Java applets can easily be modified to act as spyware.
-
Java applets serve no useful purpose other than virus delivery.
-
Java applets can delete files on your hard drive.
-
Java applets usually contain viruses.