Exam Compass - Malware Quiz Flashcards

1
Q

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Adware
Malware
Ransomware
Spyware

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.
True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
Spyware
Backdoor
Trojan

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the statements listed below apply to the definition of a computer virus? (Select 3 answers)
A self-replicating computer program containing malicious segment
Malware that requires its host application to be run to make the virus active
A standalone malicious computer program that replicates itself over a computer network
Malware that can run by itself without any interaction
Malicious code that attaches itself to an application program or other executable component
A self-contained malicious program or code that does need a host to propagate itself

A

A self-replicating computer program containing malicious segment

Malware that requires its host application to be run to make the virus active

Malicious code that attaches itself to an application program or other executable component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Malicious software collecting information about users without their knowledge/consent is called:
Cryptomalware
Adware
Ransomware
Spyware

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is referred to as:
Grayware
Adware
Ransomware
Spyware

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is an example of spyware?
Keylogger
Vulnerability scanner
Computer worm
Packet sniffer

A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of virus that infects the storage drive area containing the necessary data and code used to start the OS is known as:
Phage virus
Boot sector virus
Retrovirus
Polymorphic virus

A

Boot sector virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the answers listed below refers to a malware type that exploits computing resources without the owner’s consent?
Rootkit
Cryptominer
Grayware
Trojan horse

A

Cryptominer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following choices provides the most effective means for malware removal?
Antivirus
Anti-malware
Software firewall
Recovery mode
OS reinstallation

A

OS reinstallation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly