Chapter 02 Quiz – Malware and Social Engineering Attacks Flashcards

Questions 19

1
Q

Question # 01

Malware is software that enters a computer system with the user’s knowledge or consent and then performs an unwanted and harmful action.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Question # 02

Once the malware reaches a system through circulation, then it must embed itself into that system.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Question # 03

A polymorphic virus changes its internal code to one of a set number of predefined mutations whenever it is executed.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Question # 04

A rootkit can hide its presence, but not the presence of other malware.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Question # 05

Phishing is sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.

a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Question # 06

Vishing is a false warning, often contained in an email message claiming to come from the IT department.

a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Question # 07

What term below is used to describe the process of gathering information for an attack by relying on the weaknesses of individuals?

a. phreaking
b. hacking
c. social engineering
d. reverse engineering

A

c. social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Question # 08

One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?

a. stealth
b. appender
c. Swiss cheese
d. split

A

c. Swiss cheese

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Question # 09

What type of malware is heavily dependent on a user in order to spread?

a. Trojan
b. worm
c. rootkit
d. virus

A

d. virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Question # 10

A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:

a. rootkit
b. macro
c. program
d. process

A

b. macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Question # 11

What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as a virus?

a. rootkit
b. backdoor
c. wrapper
d. shield

A

a. rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Question # 12

What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?

a. adware
b. keylogger
c. spam
d. Trojan

A

a. adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Question # 13

What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?

a. spam
b. adware
c. watering hole
d. typo Squatting

A

c. watering hole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Question # 14

What type of system security malware allows for access to a computer, program, or service without authorization?

a. botnet
b. zombie
c. backdoor
d. command and control

A

c. backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Question # 15

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:

a. lock-ware
b. ransomware
c. stealware
d. hostageware

A

b. ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Question # 16

What type of malicious software technology is used to monitor user behavior or gather information about the user, sometimes including personally identifiable or other sensitive information?

a. automatic download software
b. automated software
c. system modifying software
d. tracking software

A

d. tracking software

17
Q

Question # 17

What type of spyware silently captures and stores each keystroke that a user types on the computer’s keyboard?

a. key indexing
b. ransomware
c. passive tracking
d. keylogger

A

d. keylogger

18
Q

Question # 18

What type of software can be installed in an individual’s web browser to prevent ads from displaying?

a. antivirus
b. ad blocking
c. cookie scanning
d. ad sensing

A

b. ad blocking

19
Q

Question # 19

Explain how an appender infection works.

A

The virus first appends itself to the end of a file.

It then moves the first three bytes of the original file to the virus code and replaces them with a “jump” instruction pointing to the virus code.

When the program is launched, the jump instruction redirects control to the virus.