Exam Compass - Malware Quiz Flashcards
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Adware
Malware
Ransomware
Spyware
Malware
A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.
True
False
True
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
Spyware
Backdoor
Trojan
Rootkit
Which of the statements listed below apply to the definition of a computer virus? (Select 3 answers)
A self-replicating computer program containing malicious segment
Malware that requires its host application to be run to make the virus active
A standalone malicious computer program that replicates itself over a computer network
Malware that can run by itself without any interaction
Malicious code that attaches itself to an application program or other executable component
A self-contained malicious program or code that does need a host to propagate itself
A self-replicating computer program containing malicious segment
Malware that requires its host application to be run to make the virus active
Malicious code that attaches itself to an application program or other executable component
Malicious software collecting information about users without their knowledge/consent is called:
Cryptomalware
Adware
Ransomware
Spyware
Spyware
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is referred to as:
Grayware
Adware
Ransomware
Spyware
Ransomware
Which of the following is an example of spyware?
Keylogger
Vulnerability scanner
Computer worm
Packet sniffer
Keylogger
A type of virus that infects the storage drive area containing the necessary data and code used to start the OS is known as:
Phage virus
Boot sector virus
Retrovirus
Polymorphic virus
Boot sector virus
Which of the answers listed below refers to a malware type that exploits computing resources without the owner’s consent?
Rootkit
Cryptominer
Grayware
Trojan horse
Cryptominer
Which of the following choices provides the most effective means for malware removal?
Antivirus
Anti-malware
Software firewall
Recovery mode
OS reinstallation
OS reinstallation