Loading [MathJax]/jax/output/HTML-CSS/fonts/TeX/fontdata.js

Security Quiz Review

Description

Quiz on Security Quiz Review, created by Rylan Blah on 12/11/2015.
Rylan Blah
Quiz by Rylan Blah, updated more than 1 year ago
Rylan Blah
Created by Rylan Blah over 9 years ago
542
1
1 2 3 4 5 (1)

Resource summary

Question 1

Question
Which of the following are parts of the attack surface?
Answer
  • Application
  • Network
  • Operating System
  • Hardware

Question 2

Question
Which of the following is the most difficult part of the attack surface to hack?
Answer
  • Application
  • Operating System
  • Network

Question 3

Question
Which of the following is the easiest part of the attack surface to hack?
Answer
  • Application
  • Operating System
  • Network

Question 4

Question
Population growth is a characteristic of ____________________________
Answer
  • Self Replicating Malware
  • Parasitic Malware
  • Logic Bombs

Question 5

Question
Logic Bombs are often
Answer
  • Self Replicating
  • Population Growth
  • Parasitic

Question 6

Question
A Trojan Horse is
Answer
  • Self Replicating
  • Population Growth
  • Parasitic

Question 7

Question
A Backdoor is likely
Answer
  • Self Replicating
  • Population Growth
  • Parasitic

Question 8

Question
A Virus is
Answer
  • Self-Replicating
  • Population Growth
  • Parasitic

Question 9

Question
Worms are
Answer
  • Self-Replicating
  • Population Growth
  • Parasitic

Question 10

Question
What are the three parts of a virus?
Answer
  • Infection Mechanism
  • Trigger
  • Payload
  • Replication Mechanism

Question 11

Question
For a Virus to be considered a Virus it must have an Infection Mechanism otherwise it could be considered a Logic Bomb.
Answer
  • True
  • False

Question 12

Question
A Rabbit can be which of the following
Answer
  • Worm
  • Fork Bomb
  • Virus

Question 13

Question
The population growth of a rabbit is either zero or very very aggressive.
Answer
  • True
  • False

Question 14

Question
Parasitic malware does not require some other executable code to exist and can simple use any file on the system.
Answer
  • True
  • False

Question 15

Question
How would Sun Tzu treat spies who spie on him?
Answer
  • He would have there head's chopped of because he is a savage.
  • He would in prison them.
  • He would treat them well, infact better than his enemy treats them to try and bring them to his side.

Question 16

Question
Static Analysis of a program/process involves.
Answer
  • Analyzing the program while the process is not running.
  • Analyzing the process while the program is running.
  • Analyzing the program while the process is running.

Question 17

Question
Dynamic Analysis involves analyzing the process while it is running.
Answer
  • True
  • False

Question 18

Question
To hide the true nature of something is too [blank_start]obfuscate[blank_end] it.
Answer
  • obfuscate

Question 19

Question
What are signs that a program has been packed.
Answer
  • Very few imports
  • Very small size
  • Lots of Strings

Question 20

Question
What are signs that a program has been obfuscated?
Answer
  • Very few Strings
  • Very few imports
  • The program has been packed
  • The size is very small
  • The program is bigger on disk than it's advertised size
Show full summary Hide full summary

0 comments

There are no comments, be the first and leave one below:

Similar

Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls
Security (1)
Daniel Freedman