FMA Flashcards
Which traits do all malware—viruses, worms, and Trojan—share in common? (Choose all that apply.)
a) They originate from outside the network.
b) They use or damage computer resources.
c) They enter computer systems, usually without the user’s knowledge or intent.
d) They release hidden payloads designed to damage hard drives and corrupt data files.
c)They enter computer systems, usually without the user’s knowledge or intent.
What is the defining characteristic of Trojan horse programs?
a) They appear to be harmless but hide malicious intent.
b) They are not intended to cause harm and only make fun of the user.
c) They replicate and attach themselves to host files.
d) They do not require user intervention to spread or function
a)They appear to be harmless but hide malicious intent.
Why are worms described as “self contained?”
a) Worms do not replicate.
b) Worms do not spread to other computer systems.
c) Worms do not require a host file to spread.
d) Worms do not carry payloads.
c)Worms do not require a host file to spread.
How does a mass mailing worm spread? (Choose all that apply.)
a) Create a copy of itself in a directory
b) Create a registry entry
c) Get email addresses
d) Executes a program
c)Get email addresses
How are damages arising from computer threats categorized?
a) Lost productivity, recovery and cleanup costs, lost data and damaged reputations
b) Lost productivity, increased vulnerability to future virus attacks, loss of confidential data, loss of other data
c) Network downtime, decreased availability of computer resources, disk damage, and problems in virus isolation
d) Network disconnection, increased errors in the network, and damaged reputation due to loss of customer data
a)Lost productivity, recovery and cleanup costs, lost data and damaged reputations
Which form of grayware has infected your computer if your keystroke data is logged?
a) Adware
b) Browser Helper Object
c) Keylogger
d) Trackware
c)Keylogger
Which form of grayware is used to crack software copyright protection keys?
a) Browser Helper Object
b) Keylogger
c) Keygen
d) Spyware
c)Keygen
Which form of grayware tries to tempt users to use create a connection to the Internet using a telephone line and connection fee?
a) Spyware
b) Dialer
c) Hacking Tool
d) Joke Program
b)Dialer
Which computer behavior would make you suspect that you might be installing grayware?(Choose all that apply.)
a) Additional programs are also being installed at the time of installation
b) ActiveX is being used as an installer
c) A Browser Helper Object (BHO) plug-in gets installed on the browser
d) The browser security settings remain the same
a) Additional programs are also being installed at the time of installation
b) ActiveX is being used as an installer
c) A Browser Helper Object (BHO) plug-in gets installed on the browser
Which computer behavior would make you suspect that you are running grayware on a machine without your consent? (Choose all that apply)
a) Advertising banners are displayed
b) The computer performs an auto-restart
c) The system becomes unstable
d) The computer disconnects from the Internet
a) Advertising banners are displayed
b) The computer performs an auto-restart
c) The system becomes unstable
How can a mail delivery error be a threat to a user?
a) The message could contain malware attachments that cause problems if the user clicks on it.
b) The message may be delayed.
c) The error may actually be a Man-in-the-Middle attack.
d) The email message automatically poses a threat
a)The message could contain malware attachments that cause problems if the user clicks on it.
What is the defining characteristic of an Account Information social engineering ploy?
a) The user is asked to click on an attachment to view false account information.
b) The user will not be able to identify the threat.
c) The user is asked to click on a link that takes them to a site intended to get account information.
d) The user downloads account software and infects the computer with malware
c)The user is asked to click on a link that takes them to a site intended to get account information.
What type of social engineering and malware design take advantage of a user’s guilt?
a) Accusatory
b) Free Stuff
c) Generic Conversations
d) Virus Alert
a)Accusatory
What graphical technique is used to prevent spammers from attacking a Website and allow legitimate users access to information?
a) Graphical User Interface (GUI)
b) A captcha
c) A browser plug-in
d) Adware pop-up
b)A captcha
What message characteristics indicate that you are the recipient of a Phishing attack? Choose all that apply)
a) Email address
b) Greeting does not have a first and last name
c) Typing errors in the messages from businesses
d) Alarmist tone in the message
b) Greeting does not have a first and last name
c) Typing errors in the messages from businesses
d) Alarmist tone in the message
Which of the following is not classified as a stage of Advanced Persistent Threats?
a) Data Exfiltration
b) Reconnaissance
c) Infection
d) Command and Control Communication
c)Infection
Which stage can benefit from the use of Backdoors?
a) Lateral Movement
b) Data Exfiltration
c) Command and Control Communication
d) All of the above
d)All of the above
What is the type of social engineering attack that uses customized and contextually relevant messages that are sent to a specific target?
a) Phishing Spam
b) Clickjacking
c) Spear Phishing
d) Watering Hole Attacks
c)Spear Phishing
In what stage can an attacker ensure persistence in the network for possible future infiltrations?
a) Lateral Movement
b) Command and Control Communication
c) Point of Entry
d) Data/Asset Discovery
a)Lateral Movement
Which of the following can be used to transfer data during Data Exfiltration?
a) Shared Folders
b) BitTorrent
c) Windows Management Instrumentation
d) None of the Above
c)Windows Management Instrumentation
Why does the Trend Micro Smart Protection Network (SPN) use in-the-cloud technologies for monitoring threats?
e) That is where the threats are located
f) Threats can be scanned more quickly there
g) The technologies are developed for in-the-cloud locations
h) It is faster to use Trend Micro’s updated solutions in the cloud, than to perform the daily updates on a machine to protect against the new Web threats of the day
h)It is faster to use Trend Micro’s updated solutions in the cloud, than to perform the daily updates on a machine to protect against the new Web threats of the day
Which Trend Micro Smart Protection Network (SPN) technology performs a data crawl of each file hosted on a Web page to confirm the reputation of that page?
e) File reputation technology
f) Web reputation technology
g) Email reputation technology
h) Correlation technology
e)File reputation technology
Which Trend Micro solution provides security with the following: anti-spyware, anti-Spam, antivirus, and anti-Phishing?
e) HouseCall Server Edition
f) Mobile Security
g) OfficeScan
h) Network VirusWall Enforcer
f) Mobile Security
g) OfficeScan
What characteristic of a web site is being checked when your security software checks the “In the Cloud” layer?
e) Firewall settings
f) Internet connection
g) Website reputation
h) URL validity
g)Website reputation
What does Trend Protect help you avoid? (Choose all that apply)
e) Web pages with unwanted content*
f) Web pages that require too much bandwidth
g) Web pages with downloads
h) Web pages with hidden threats
e) Web pages with unwanted content*
h) Web pages with hidden threats