Core 2: Malware Flashcards
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Adware
Malware
Ransomware
Spyware
Malware
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:
Grayware
Adware
Ransomware
Spyware
Ransomware
Which of the following terms refers to an example of crypto-malware?
Backdoor
Ransomware
Keylogger
Rootkit
Ransomware
A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.
True
False
True
Which of the following is an example of spyware?
Keylogger
Vulnerability scanner
Computer worm
Packet sniffer
Keylogger
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
Spyware
Backdoor
Trojan
Rootkit
Which of the following statements apply to the definition of a computer virus? (Select 3 answers)
A self-replicating computer program containing malicious segment
Requires its host application to be run to make the virus active
A standalone malicious computer program that replicates itself over a computer network
Can run by itself without any interaction
Attaches itself to an application program or other executable component
A self-contained malicious program or code that does need a host to propagate itself
A self-replicating computer program containing malicious segment
Requires its host application to be run to make the virus active
Attaches itself to an application program or other executable component
A malware-infected networked host under remote control of a hacker is commonly referred to as a:
Trojan
Worm
Bot
Honeypot
Bot
Which of the following terms is used to describe a collection of intermediary compromised systems that are used as a platform for a DDoS attack?
Honeynet
Botnet
Quarantine network
Malware
Botnet
What is the name of a standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth?
Spyware
Worm
Trojan
Spam
Worm
Malicious software collecting information about users without their knowledge/consent is known as:
Crypto-malware
Adware
Ransomware
Spyware
Spyware
Which of the following enables troubleshooting a malware-infected system that doesn’t boot up?
Anti-malware application
Recovery console
AV software
Backup/restore options
Recovery console
Which of the following methods can be used to launch Windows Recovery Environment (WinRE) in Windows 8/8.1/10?
Boot from installation media
In Power menu, hold down the Shift key and select Restart
Boot from Recovery Drive
Perform system restart from the Settings menu
All of the above
All of the above
Restoring the entire system from a known good backup copy is the most reliable method for effective malware removal.
True
False
True
Which of the following would be the best malware-prevention method/tool?
An up-to-date antivirus application Software firewall An up-to-date anti-malware application End user education System restore from a known good backup
End user education