C Danvers
Quiz by , created more than 1 year ago

Ch 2 quiz

740
0
0
C Danvers
Created by C Danvers over 6 years ago
Close

Ch 2 - Malware & Social Engineering

Question 1 of 40

1

A polymorphic virus changes its internal code to one of a set number of predefined mutations whenever it is executed.

Select one of the following:

  • True
  • False

Explanation

Question 2 of 40

1

A remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols.

Select one of the following:

  • True
  • False

Explanation

Question 3 of 40

1

A rootkit can hide its presence, but not the presence of other malware.

Select one of the following:

  • True
  • False

Explanation

Question 4 of 40

1

A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:

Select one of the following:

  • A macro

  • A program

  • A rootkit

  • A process

Explanation

Question 5 of 40

1

A virus self-replicates on the host computer and spreads to other computers by itself.

Select one of the following:

  • True
  • False

Explanation

Question 6 of 40

1

A virus that infects an executable program file is known as?

Select one of the following:

  • boot sector virus

  • program virus

  • macro virus

  • companion virus

Explanation

Question 7 of 40

1

How many different Microsoft Windows file types can be infected with a virus?

Select one of the following:

  • 60

  • 80

  • 50

  • 70

Explanation

Question 8 of 40

1

Malware is software that enters a computer system with the user's knowledge or consent and then performs an unwanted and harmful action.

Select one of the following:

  • True
  • False

Explanation

Question 9 of 40

1

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:

Select one of the following:

  • stealware

  • lock-ware

  • hostageware

  • ransomware

Explanation

Question 10 of 40

1

Once the malware reaches a system through circulation, then it must embed itself into that system.

Select one of the following:

  • True
  • False

Explanation

Question 11 of 40

1

One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?

Select one of the following:

  • appender

  • swiss cheese

  • split

  • stealth

Explanation

Question 12 of 40

1

Phishing is sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.

Select one of the following:

  • True
  • False

Explanation

Question 13 of 40

1

Select below the type of malware that appears to have a legitimate use, but contains something malicious:

Select one of the following:

  • trojan

  • script

  • virus

  • worm

Explanation

Question 14 of 40

1

Select the term used to describe tracking software that is deployed without the consent or control of the user.

Select one of the following:

  • trojan

  • botnet

  • malware

  • spyware

Explanation

Question 15 of 40

1

Social engineering impersonation means to masquerade as a real or fictitious character and then play out the role of that person on a victim.

Select one of the following:

  • True
  • False

Explanation

Question 16 of 40

1

Two types of malware have the primary trait of circulation. These are viruses and worms.

Select one of the following:

  • True
  • False

Explanation

Question 17 of 40

1

Vishing is a false warning, often contained in an email message claiming to come from the IT department.

Select one of the following:

  • True
  • False

Explanation

Question 18 of 40

1

What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?

Select one of the following:

  • adware

  • trojan

  • keylogger

  • spam

Explanation

Question 19 of 40

1

What social engineering principal convinces a victim an immediate action is needed?

Select one of the following:

  • authority

  • intimidation

  • urgency

  • scarcity

Explanation

Question 20 of 40

1

What social engineering principal frightens and coerces a victim by using threats?

Select one of the following:

  • authority

  • scarcity

  • urgency

  • intimidation

Explanation

Question 21 of 40

1

What specific science discipline do most social engineering attacks rely on when they are being used?

Select one of the following:

  • psychology

  • engineering

  • criminology

  • psychiatry

Explanation

Question 22 of 40

1

What specific type of phishing attack uses the telephone to target a victim?

Select one of the following:

  • spear phishing

  • whaling

  • target phising

  • vishing

Explanation

Question 23 of 40

1

What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?

Select one of the following:

  • phreaking

  • social engineering

  • hacking

  • reverse engineering

Explanation

Question 24 of 40

1

What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?

Select one of the following:

  • typo squatting

  • adware

  • spam

  • watering hole

Explanation

Question 25 of 40

1

What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it?

Select one of the following:

  • logic bomb

  • script

  • macro virus

  • metamorphic virus

Explanation

Question 26 of 40

1

What type of malicious software technology is used to download and install software without the user's interaction?

Select one of the following:

  • automated software

  • system modifying software

  • automatic download software

  • tracking software

Explanation

Question 27 of 40

1

What type of malicious software technology is used to monitor user behavior or gather information about the user, sometimes including personally identifiable or other sensitive information?

Select one of the following:

  • automated software

  • system modifying software

  • tracking software

  • automatic download software

Explanation

Question 28 of 40

1

What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as a virus?

Select one of the following:

  • wrapper

  • rootkit

  • backdoor

  • shield

Explanation

Question 29 of 40

1

What type of malware is heavily dependent on a user in order to spread?

Select one of the following:

  • rootkit

  • worm

  • virus

  • trojan

Explanation

Question 30 of 40

1

What type of ransomware displays a screen and prevents the user from accessing the computer's resources?

Select one of the following:

  • standard ransomware

  • locking-malware

  • crypto-malware

  • blocker ransomware

Explanation

Question 31 of 40

1

What type of ransomware was developed to block the user from accessing the computer and encrypts all the files on the user's device?

Select one of the following:

  • locking-malware

  • blocker ransomware

  • crypto-malware

  • standard ransomware

Explanation

Question 32 of 40

1

What type of software can be installed in an individual's web browser to prevent ads from displaying

Select one of the following:

  • cookie scanning

  • ad blocking

  • ad sensing

  • antivirus

Explanation

Question 33 of 40

1

What type of spyware silently captures and stores each keystroke that a user types on the computer's keyboard?

Select one of the following:

  • ransomware

  • key indexing

  • passive tracking

  • keylogger

Explanation

Question 34 of 40

1

What type of structure is used to provide instructions to infected bot computers?

Select one of the following:

  • client-server

  • bot herder

  • hive

  • command & control

Explanation

Question 35 of 40

1

What type of system security malware allows for access to a computer, program, or service without authorization?

Select one of the following:

  • command & control

  • backdoor

  • botnet

  • zombie

Explanation

Question 36 of 40

1

What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks?

Select one of the following:

  • bug

  • Easter egg

  • Trojan horse

  • virus

Explanation

Question 37 of 40

1

Which of the following are considered to be the primary payload capabilities found in malware? (Choose all that apply.)

Select one or more of the following:

  • modify data

  • collect data

  • launch attacks

  • delete data

Explanation

Question 38 of 40

1

Which of the following is malicious computer code that reproduces itself on the same computer?

Select one of the following:

  • worm

  • adware

  • spyware

  • virus

Explanation

Question 39 of 40

1

Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trait that the malware possesses?

Select one of the following:

  • concealment

  • source

  • circulation

  • infection

Explanation

Question 40 of 40

1

Which type of phishing attack targets specific users?

Select one of the following:

  • vishing

  • target phishing

  • whaling

  • spear phishing

Explanation