nsf_02

Beschreibung

malware and social engineering attacks
865 538
Quiz von 865 538, aktualisiert more than 1 year ago
865 538
Erstellt von 865 538 vor mehr als 7 Jahre
42
0

Zusammenfassung der Ressource

Frage 1

Frage
A ____ virus infects the Master Boot Record of a hard disk drive.
Antworten
  • a. file infector
  • b. companion
  • c. resident
  • d. boot

Frage 2

Frage
____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
Antworten
  • a. Trojan
  • b. Adware
  • c. Spam
  • d. Keylogger

Frage 3

Frage
Like a virus, a worm needs the user to perform an action such as starting a program or opening an e-mail attachment to start the infection.
Antworten
  • True
  • False

Frage 4

Frage
In a(n) ____ infection, a virus injects itself into the program’s executable code instead of at the end of the file.
Antworten
  • a. split
  • b. Swiss cheese
  • c. appender
  • d. stealth

Frage 5

Frage
Removing a rootkit from an infected computer is extremely difficult.
Antworten
  • True
  • False

Frage 6

Frage
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
Antworten
  • True
  • False

Frage 7

Frage
A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
Antworten
  • a. logic bomb
  • b. metamorphic virus
  • c. Trojan
  • d. macro virus

Frage 8

Frage
A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Antworten
  • a. rootkit
  • b. process
  • c. program
  • d. macro

Frage 9

Frage
A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
Antworten
  • a. boot
  • b. resident
  • c. file infector
  • d. companion

Frage 10

Frage
A(n) ____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program.
Antworten
  • a. companion
  • b. metamorphic
  • c. macro
  • d. boot

Frage 11

Frage
A(n) ____ requires a user to transport it from one computer to another.
Antworten
  • a. worm
  • b. rootkit
  • c. virus
  • d. adware

Frage 12

Frage
Which of these is NOT an action that a virus can take?
Antworten
  • a. transport itself through the network to another device
  • b. cause a computer to crash
  • c. erase files from a hard drive
  • d. reformat the hard disk drive

Frage 13

Frage
Which malware locks up a user's computer and then displays a message that purports to come from a law enforcement agency?
Antworten
  • a. virus
  • b. ransomware
  • c. worm
  • d. Trojan

Frage 14

Frage
Which of the following is an attempt to influence a user by coercion?
Antworten
  • a. authority
  • b. social proof
  • c. intimidation
  • d. familiarity

Frage 15

Frage
A user who installs a program that prints out coupons but in the background silently collects herd passwords has installed a ____.
Antworten
  • a. virus
  • b. worm
  • c. Trojan
  • d. logic bomb

Frage 16

Frage
What should you do completely remove a rootkit from a computer?
Antworten
  • a. Flash the ROM BIOS.
  • b. Erase and reinstall all files in the WINDOWS folder.
  • c. Expand the Master Boot Record.
  • d. Reformat the hard drive and reinstall the operating system.

Frage 17

Frage
Which of these could NOT be defined as a logic bomb?
Antworten
  • a. Erase all data if John Smith’s name is removed from the list of employees.
  • b. Reformat the hard drive three months after Susan Jones left the company.
  • c. Send spam email to all users in the company on Tuesday.
  • d. If the company’s stock price drops below $10, them credit Jeff Brown with 10 additional years of retirement credit.

Frage 18

Frage
What is it called when a user makes a typing error when entering a URL that takes him takes him to an imposter website?
Antworten
  • a. URL variance
  • b. typo squatting
  • c. spell scraping
  • d. work hijacking

Frage 19

Frage
Which of these is a general term used for describing software that gathers information without the user's consent?
Antworten
  • a. adware
  • b. spyware
  • c. scrapeware
  • d. pullware

Frage 20

Frage
Which statement regarding a keylogger is NOT true?
Antworten
  • a. Hardware keepers are installed between the keyboard connector and computer keyboard USB port.
  • b. Software keyloggers are easy to detect.
  • c. Keyloggers can be used to capture passwords, credit card numbers, or personal information.
  • d. Software keyloggers can be designed to send captured information automatically back to the attacker through the Internet.

Frage 21

Frage
The preferred method today of bot herders for command and control of zombies is ____.
Antworten
  • a. Internet Relay Chat (IRC)
  • b. botnets
  • c. Hypertext Transport Protocol (HTTP)
  • d. spam

Frage 22

Frage
A watering how attack is directed against ____.
Antworten
  • a. wealthy individuals
  • b. attackers who send spam
  • c. all users of a large corporation
  • d. users who access a common website

Frage 23

Frage
____ sends phishing messages only to wealthy individuals.
Antworten
  • a. Spear phishing
  • b. Target phishing
  • c. Microing
  • d. Whaling

Frage 24

Frage
What is unsolicited incoming messages called?
Antworten
  • a. spim
  • b. spam
  • c. vishing
  • d. SMS phishing

Frage 25

Frage
Michelle pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Michelle performed?
Antworten
  • a. aliasing
  • b. impersonation
  • c. hiring
  • d. duplicity

Frage 26

Frage
How can an attacker use a hoax?
Antworten
  • a. By sending out a hoax, an attacker can convince a hat to read his email more often.
  • b. A hoax can convince a user that a bad Trojan is circulating and that grew should change how security settings.
  • c. A user who receives multiple hoaxes could contact house supervisor for help.
  • d. Hoaxes are not used but attackers today.

Frage 27

Frage
Which of these items retrieved through dumpster diving would NOT provide useful information?
Antworten
  • a. calendars
  • b. memos
  • c. organizational charts
  • d. books

Frage 28

Frage
____ is following an authorized person through a secure door.
Antworten
  • a. Tagging
  • b. Backpacking
  • c. Tailgating
  • d. Caboosing

Frage 29

Frage
Each of these is a reason why adware is scorned EXCEPT ____.
Antworten
  • a. it displays the attacker's programming skills.
  • b. it can interfere with a user's productivity.
  • c. it displays objectionable content.
  • d. it can cause a computer to crash or slow down.

Frage 30

Frage
What is the term used for a attacker who controls multiple zombies in a botnet?
Antworten
  • a. zombie shepherd
  • b. rogue IRC
  • c. bot herder
  • d. cyber-robot
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

nsf_03
865 538
nz ns gm
Gene Miranda
nsf_04(15)
865 538
nsf_05(4)
865 538
nsf_06(7)
865 538
nsf_09(11)
865 538
nsf_01
865 538
nsf_07(8)
865 538
nsf_08(9)
865 538
Dioses
Andres Tejada
Verwitterung Transport und Sedimentation
Weltraumkatze Fanroth