FMA Flashcards
Which traits do all malware—viruses, worms, and Trojan—share in common? (Choose all that apply.)
a) They originate from outside the network.
b) They use or damage computer resources.
c) They enter computer systems, usually without the user’s knowledge or intent.
d) They release hidden payloads designed to damage hard drives and corrupt data files.
c)They enter computer systems, usually without the user’s knowledge or intent.
What is the defining characteristic of Trojan horse programs?
a) They appear to be harmless but hide malicious intent.
b) They are not intended to cause harm and only make fun of the user.
c) They replicate and attach themselves to host files.
d) They do not require user intervention to spread or function
a)They appear to be harmless but hide malicious intent.
Why are worms described as “self contained?”
a) Worms do not replicate.
b) Worms do not spread to other computer systems.
c) Worms do not require a host file to spread.
d) Worms do not carry payloads.
c)Worms do not require a host file to spread.
How does a mass mailing worm spread? (Choose all that apply.)
a) Create a copy of itself in a directory
b) Create a registry entry
c) Get email addresses
d) Executes a program
c)Get email addresses
How are damages arising from computer threats categorized?
a) Lost productivity, recovery and cleanup costs, lost data and damaged reputations
b) Lost productivity, increased vulnerability to future virus attacks, loss of confidential data, loss of other data
c) Network downtime, decreased availability of computer resources, disk damage, and problems in virus isolation
d) Network disconnection, increased errors in the network, and damaged reputation due to loss of customer data
a)Lost productivity, recovery and cleanup costs, lost data and damaged reputations
Which form of grayware has infected your computer if your keystroke data is logged?
a) Adware
b) Browser Helper Object
c) Keylogger
d) Trackware
c)Keylogger
Which form of grayware is used to crack software copyright protection keys?
a) Browser Helper Object
b) Keylogger
c) Keygen
d) Spyware
c)Keygen
Which form of grayware tries to tempt users to use create a connection to the Internet using a telephone line and connection fee?
a) Spyware
b) Dialer
c) Hacking Tool
d) Joke Program
b)Dialer
Which computer behavior would make you suspect that you might be installing grayware?(Choose all that apply.)
a) Additional programs are also being installed at the time of installation
b) ActiveX is being used as an installer
c) A Browser Helper Object (BHO) plug-in gets installed on the browser
d) The browser security settings remain the same
a) Additional programs are also being installed at the time of installation
b) ActiveX is being used as an installer
c) A Browser Helper Object (BHO) plug-in gets installed on the browser
Which computer behavior would make you suspect that you are running grayware on a machine without your consent? (Choose all that apply)
a) Advertising banners are displayed
b) The computer performs an auto-restart
c) The system becomes unstable
d) The computer disconnects from the Internet
a) Advertising banners are displayed
b) The computer performs an auto-restart
c) The system becomes unstable
How can a mail delivery error be a threat to a user?
a) The message could contain malware attachments that cause problems if the user clicks on it.
b) The message may be delayed.
c) The error may actually be a Man-in-the-Middle attack.
d) The email message automatically poses a threat
a)The message could contain malware attachments that cause problems if the user clicks on it.
What is the defining characteristic of an Account Information social engineering ploy?
a) The user is asked to click on an attachment to view false account information.
b) The user will not be able to identify the threat.
c) The user is asked to click on a link that takes them to a site intended to get account information.
d) The user downloads account software and infects the computer with malware
c)The user is asked to click on a link that takes them to a site intended to get account information.
What type of social engineering and malware design take advantage of a user’s guilt?
a) Accusatory
b) Free Stuff
c) Generic Conversations
d) Virus Alert
a)Accusatory
What graphical technique is used to prevent spammers from attacking a Website and allow legitimate users access to information?
a) Graphical User Interface (GUI)
b) A captcha
c) A browser plug-in
d) Adware pop-up
b)A captcha
What message characteristics indicate that you are the recipient of a Phishing attack? Choose all that apply)
a) Email address
b) Greeting does not have a first and last name
c) Typing errors in the messages from businesses
d) Alarmist tone in the message
b) Greeting does not have a first and last name
c) Typing errors in the messages from businesses
d) Alarmist tone in the message