FMA Flashcards

1
Q

Which traits do all malware—viruses, worms, and Trojan—share in common? (Choose all that apply.)

a) They originate from outside the network.
b) They use or damage computer resources.
c) They enter computer systems, usually without the user’s knowledge or intent.
d) They release hidden payloads designed to damage hard drives and corrupt data files.

A

c)They enter computer systems, usually without the user’s knowledge or intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the defining characteristic of Trojan horse programs?

a) They appear to be harmless but hide malicious intent.
b) They are not intended to cause harm and only make fun of the user.
c) They replicate and attach themselves to host files.
d) They do not require user intervention to spread or function

A

a)They appear to be harmless but hide malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are worms described as “self contained?”

a) Worms do not replicate.
b) Worms do not spread to other computer systems.
c) Worms do not require a host file to spread.
d) Worms do not carry payloads.

A

c)Worms do not require a host file to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does a mass mailing worm spread? (Choose all that apply.)

a) Create a copy of itself in a directory
b) Create a registry entry
c) Get email addresses
d) Executes a program

A

c)Get email addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How are damages arising from computer threats categorized?

a) Lost productivity, recovery and cleanup costs, lost data and damaged reputations
b) Lost productivity, increased vulnerability to future virus attacks, loss of confidential data, loss of other data
c) Network downtime, decreased availability of computer resources, disk damage, and problems in virus isolation
d) Network disconnection, increased errors in the network, and damaged reputation due to loss of customer data

A

a)Lost productivity, recovery and cleanup costs, lost data and damaged reputations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which form of grayware has infected your computer if your keystroke data is logged?

a) Adware
b) Browser Helper Object
c) Keylogger
d) Trackware

A

c)Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which form of grayware is used to crack software copyright protection keys?

a) Browser Helper Object
b) Keylogger
c) Keygen
d) Spyware

A

c)Keygen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which form of grayware tries to tempt users to use create a connection to the Internet using a telephone line and connection fee?

a) Spyware
b) Dialer
c) Hacking Tool
d) Joke Program

A

b)Dialer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which computer behavior would make you suspect that you might be installing grayware?(Choose all that apply.)

a) Additional programs are also being installed at the time of installation
b) ActiveX is being used as an installer
c) A Browser Helper Object (BHO) plug-in gets installed on the browser
d) The browser security settings remain the same

A

a) Additional programs are also being installed at the time of installation
b) ActiveX is being used as an installer
c) A Browser Helper Object (BHO) plug-in gets installed on the browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which computer behavior would make you suspect that you are running grayware on a machine without your consent? (Choose all that apply)

a) Advertising banners are displayed
b) The computer performs an auto-restart
c) The system becomes unstable
d) The computer disconnects from the Internet

A

a) Advertising banners are displayed
b) The computer performs an auto-restart
c) The system becomes unstable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can a mail delivery error be a threat to a user?

a) The message could contain malware attachments that cause problems if the user clicks on it.
b) The message may be delayed.
c) The error may actually be a Man-in-the-Middle attack.
d) The email message automatically poses a threat

A

a)The message could contain malware attachments that cause problems if the user clicks on it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the defining characteristic of an Account Information social engineering ploy?

a) The user is asked to click on an attachment to view false account information.
b) The user will not be able to identify the threat.
c) The user is asked to click on a link that takes them to a site intended to get account information.
d) The user downloads account software and infects the computer with malware

A

c)The user is asked to click on a link that takes them to a site intended to get account information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of social engineering and malware design take advantage of a user’s guilt?

a) Accusatory
b) Free Stuff
c) Generic Conversations
d) Virus Alert

A

a)Accusatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What graphical technique is used to prevent spammers from attacking a Website and allow legitimate users access to information?

a) Graphical User Interface (GUI)
b) A captcha
c) A browser plug-in
d) Adware pop-up

A

b)A captcha

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What message characteristics indicate that you are the recipient of a Phishing attack? Choose all that apply)

a) Email address
b) Greeting does not have a first and last name
c) Typing errors in the messages from businesses
d) Alarmist tone in the message

A

b) Greeting does not have a first and last name
c) Typing errors in the messages from businesses
d) Alarmist tone in the message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following is not classified as a stage of Advanced Persistent Threats?

a) Data Exfiltration
b) Reconnaissance
c) Infection
d) Command and Control Communication

A

c)Infection

17
Q

Which stage can benefit from the use of Backdoors?

a) Lateral Movement
b) Data Exfiltration
c) Command and Control Communication
d) All of the above

A

d)All of the above

18
Q

What is the type of social engineering attack that uses customized and contextually relevant messages that are sent to a specific target?

a) Phishing Spam
b) Clickjacking
c) Spear Phishing
d) Watering Hole Attacks

A

c)Spear Phishing

19
Q

In what stage can an attacker ensure persistence in the network for possible future infiltrations?

a) Lateral Movement
b) Command and Control Communication
c) Point of Entry
d) Data/Asset Discovery

A

a)Lateral Movement

20
Q

Which of the following can be used to transfer data during Data Exfiltration?

a) Shared Folders
b) BitTorrent
c) Windows Management Instrumentation
d) None of the Above

A

c)Windows Management Instrumentation

21
Q

Why does the Trend Micro Smart Protection Network (SPN) use in-the-cloud technologies for monitoring threats?

e) That is where the threats are located
f) Threats can be scanned more quickly there
g) The technologies are developed for in-the-cloud locations
h) It is faster to use Trend Micro’s updated solutions in the cloud, than to perform the daily updates on a machine to protect against the new Web threats of the day

A

h)It is faster to use Trend Micro’s updated solutions in the cloud, than to perform the daily updates on a machine to protect against the new Web threats of the day

22
Q

Which Trend Micro Smart Protection Network (SPN) technology performs a data crawl of each file hosted on a Web page to confirm the reputation of that page?

e) File reputation technology
f) Web reputation technology
g) Email reputation technology
h) Correlation technology

A

e)File reputation technology

23
Q

Which Trend Micro solution provides security with the following: anti-spyware, anti-Spam, antivirus, and anti-Phishing?

e) HouseCall Server Edition
f) Mobile Security
g) OfficeScan
h) Network VirusWall Enforcer

A

f) Mobile Security

g) OfficeScan

24
Q

What characteristic of a web site is being checked when your security software checks the “In the Cloud” layer?

e) Firewall settings
f) Internet connection
g) Website reputation
h) URL validity

A

g)Website reputation

25
Q

What does Trend Protect help you avoid? (Choose all that apply)

e) Web pages with unwanted content*
f) Web pages that require too much bandwidth
g) Web pages with downloads
h) Web pages with hidden threats

A

e) Web pages with unwanted content*

h) Web pages with hidden threats