Chapter 2 Flashcards

1
Q

Which of the following is NOT a primary trait of malware?

Diffusion

Circulation

Infection

Concealment

A

Diffusion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of malware requires a user to transport it from one computer to another?

Worm

Rootkit

Adware

Virus

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of mutation completely changes a virus from its original form by rewriting its own code whenever it is executed?

Betamorphic

Oligomorphic

Polymorphic

Metamorphic

A

Polymorphic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free program to receive weather reports, but the program had also installed malware on the computer that gave the threat actor unrestricted access to the computer. What type of malware had been downloaded?

Virus

Ransomware

RAT

Trojan

A

RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Linnea’s father called her to say that a message suddenly appeared on his screen that says his software license has expired and he must immediately pay $500 to have it renewed before control of the computer will be returned to him. What type of malware is this?

Persistent virusware

Trojanware

Blocking ransomware

Lockoutware

A

Blocking ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Astrid’s computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which time she will receive a means to unlock the files. What type of malware has infected her computer?

Bitcoin malware

Crypto-malware

Blocking virus

Networked worm

A

Crypto-malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the name of the threat actor’s computer that gives instructions to an infected computer?

Command and control (C&C) server

Resource server

Regulating Net Server (RNS)

Monitoring and Infecting (M&I) server

A

Command and control (C&C) server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of these could NOT be defined as a logic bomb?

If the company’s stock price drops below $100, then credit Juni’s account with 10 additional years of retirement credit.

Erase all data if Matilda’s name is removed from the list of employees.

Reformat the hard drive three months after Sigrid left the company.

Send spam email to Moa’s inbox on Tuesday.

A

Send spam email to Moa’s inbox on Tuesday.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is NOT correct about a rootkit?

A rootkit is able to hide its presence or the presence of other malware.

A rootkit accesses “lower layers” of the operating system.

A rootkit is always the payload of a Trojan.

The risk of a rootkit is less today than previously.

A

A rootkit is always the payload of a Trojan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of these is a general term used for describing software that gathers information without the user’s consent?

Gatherware

Adware

Spyware

Scrapeware

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Keyloggers can be used to capture passwords, credit card numbers, or personal information.

Software keyloggers are generally easy to detect.

Hardware keyloggers are installed between the keyboard connector and computer keyboard USB port.

Software keyloggers can be designed to send captured information automatically back to the attacker through the Internet.

A

Software keyloggers are generally easy to detect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A watering hole attack is directed against .

wealthy individuals

a smaller group of specific users

all users of a large corporation

attackers who send spam

A

a smaller group of specific users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

sends phishing messages only to wealthy individuals.

Whaling

Spear phishing

Target phishing

Microing

A

Whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Lykke receives a call while working at the helpdesk from someone who needs his account reset immediately. When Lykke questions the caller, he says, “If you don’t reset my account immediately, I will call your supervisor!” What psychological approach is the caller attempting to use on Lykke?

Familiarity

Scarcity

Intimidation

Consensus

A

Intimidation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hedda pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Hedda performed?

Aliasing

Duplicity

Impersonation

Luring

A

Impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can an attacker use a hoax?

A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings.

By sending out a hoax, an attacker can convince a user to read his email more often.

A user who receives multiple hoaxes could contact his supervisor for help.

Hoaxes are not used by attackers today.

A

A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings.

17
Q

Which of these items retrieved through dumpster diving would NOT provide useful information?

Calendars

Organizational charts

Memos

Books

A

Books

18
Q

is following an authorized person through a secure door.

Tagging

Tailgating

Backpacking

Caboosing

A

Tailgating

19
Q

Each of these is a reason why adware is scorned EXCEPT .

it displays objectionable content

it displays the attacker’s programming skills

it can interfere with a user’s productivity

it can cause a computer to crash or slow down

A

it displays the attacker’s programming skills

20
Q

What is the term used for a threat actor who controls multiple bots in a botnet?

Bot herder

Zombie shepherd

Rogue IRC

Cyber-robot

A

Bot herder