Chapter 02 Quiz – Malware and Social Engineering Attacks Flashcards
Questions 19
Question # 01
Malware is software that enters a computer system with the user’s knowledge or consent and then performs an unwanted and harmful action.
a. True
b. False
b. False
Question # 02
Once the malware reaches a system through circulation, then it must embed itself into that system.
a. True
b. False
a. True
Question # 03
A polymorphic virus changes its internal code to one of a set number of predefined mutations whenever it is executed.
a. True
b. False
b. False
Question # 04
A rootkit can hide its presence, but not the presence of other malware.
a. True
b. False
b. False
Question # 05
Phishing is sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.
a. True
b. False
a. True
Question # 06
Vishing is a false warning, often contained in an email message claiming to come from the IT department.
a. True
b. False
b. False
Question # 07
What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?
a. phreaking
b. hacking
c. social engineering
d. reverse engineering
c. social engineering
Question # 08
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?
a. stealth
b. appender
c. Swiss cheese
d. split
c. Swiss cheese
Question # 09
What type of malware is heavily dependent on a user in order to spread?
a. Trojan
b. worm
c. rootkit
d. virus
d. virus
Question # 10
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
a. rootkit
b. macro
c. program
d. process
b. macro
Question # 11
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as a virus?
a. rootkit
b. backdoor
c. wrapper
d. shield
a. rootkit
Question # 12
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
a. adware
b. keylogger
c. spam
d. Trojan
a. adware
Question # 13
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?
a. spam
b. adware
c. watering hole
d. typo Squatting
c. watering hole
Question # 14
What type of system security malware allows for access to a computer, program, or service without authorization?
a. botnet
b. zombie
c. backdoor
d. command and control
c. backdoor
Question # 15
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
a. lock-ware
b. ransomware
c. stealware
d. hostageware
b. ransomware