Network Security Quiz 7 Malware Exam 30 Questions with Verified Answers
Malicious software aims to trick users into revealing sensitive personal data.
... [Show More] - CORRECT ANSWER True
Keyware captures keystrokes on a compromised system. - CORRECT ANSWER False
Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics. - CORRECT ANSWER False
A virus that attaches to an executable program can do anything that the program is permitted to do. - CORRECT ANSWER True
It is not possible to spread a virus via a USB stick. - CORRECT ANSWER False
A logic bomb is the event or condition that determines when the payload is activated or delivered. - CORRECT ANSWER True
Many forms of infection can be blocked by denying normal users the right to modify programs on the system. - CORRECT ANSWER True
A macro virus infects executable portions of code. - CORRECT ANSWER False
E-mail is a common method for spreading macro viruses. - CORRECT ANSWER True
In addition to propagating, a worm usually carries some form of payload. - CORRECT ANSWER True
A Trojan horse is an apparently useful program containing hidden code that, when invoked, performs some harmful function. - CORRECT ANSWER True
Packet sniffers are mostly used to retrieve sensitive information like usernames and passwords. - CORRECT ANSWER True
A bot propagates itself and activates itself, whereas a worm is initially controlled from some central facility. - CORRECT ANSWER False
Every bot has a distinct IP address. - CORRECT ANSWER True
Programmers use backdoors to debug and test programs. - CORRECT ANSWER True
A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is __________.
A. Adobe
B. Animoto
C. Malware
D. Prezi - CORRECT ANSWER C. Malware
__________ are used to send large volumes of unwanted e-mail.
A. Rootkits
B. Spammer programs
C. Downloaders
D. Auto-rooters - CORRECT ANSWER B. Spammer programs
A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.
A. logic bomb
B. trapdoor
C. worm
D. Trojan horse - CORRECT ANSWER A. logic bomb
The term "computer virus" is attributed to __________.
A. Herman Hollerith
B. Fred Cohen
C. Charles Babbage
D. Albert Einstein - CORRECT ANSWER B. Fred Cohen
Computer viruses first appeared in the early __________.
A. 1960s
B. 1970s
C. 1980s
D. 1990s - CORRECT ANSWER C. 1980s
The __________ is what the virus "does".
A. infection mechanism
B. trigger
C. logic bomb
D. payload - CORRECT ANSWER D. payload
The __________ is when the virus function is performed.
A. dormant phase
B. propagation phase
C. triggering phase
D. execution phase - CORRECT ANSWER D. execution phase
During the __________ the virus is idle.
A. dormant phase
B. propagation phase
C. triggering phase
D. execution phase - CORRECT ANSWER A. dormant phase
A __________ uses macro or scripting code, typically embedded in a document and triggered when the document is viewed or edited, to run and replicate itself into other such documents.
A. boot sector infector
B. file infector
C. macro virus
D. multipartite virus - CORRECT ANSWER C. macro virus
__________ is the first function in the propagation phase for a network worm.
A. Propagating
B. Fingerprinting
B. Keylogging
D. Spear phishing - CORRECT ANSWER B. Fingerprinting
Unsolicited bulk e-mail is referred to as __________.
A. spam
B. propagating
C. phishing
D. crimeware - CORRECT ANSWER A. spam
__________ is malware that encrypts the user's data and demands payment in order to access the key needed to recover the information.
A. Trojan horse
B. Ransomware
C. Crimeware
D. Polymorphic - CORRECT ANSWER B. Ransomware
A __________ attack is a bot attack on a computer system or network that causes a loss of service to users.
A. spam
B. phishing
C. DDoS
D. sniff - CORRECT ANSWER C. DDoS
The ideal solution to the threat of malware is __________.
A. identification
B. removal
C. detection
D. prevention - CORRECT ANSWER D. prevention
__________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions.
A. Fingerprint-based scanners
B. Behavior-blocking software
C. Generic decryption technology
D. Heuristic scanners - CORRECT ANSWER B. Behavior-blocking software [Show Less]