J05: Information System Threats (PE) Flashcards
True or False: Trojans can often contain adware or Spyware.
True
Slammer and Code Red are examples of what type of malware?
- Trojan
- Adware
- Worm
- Spyware
worm
PFC Smith needs to sign his monthly counseling statement by tomorrow morning and has had difficulty finding a free PDF application that will allow him to digitally sign it. While browsing the internet, PFC Smith finds a link to a free PDF reader that claims that this PDF reader is the best free PDF available. After downloading and attempting to use the PDF reader to sign his document, PFC Smith noticed a large amount of popups occurring related to his recent search history. What is most likely effecting his computer?
- Trojan
- Spyware
- Adware
- None of the above
Adware
True or False: Worms are easily contained.
False
True or False: A virus is a small piece of software that piggybacks off of a real program.
True
After reading this reference material:
https://www.kaspersky.com/resource-center/definitions/drive-by-download
Dan installs SuperScrubberAntiVirus antivirus software on his new computer. While installing the software on to the computer, Dan did not read the End User Agreement and clicked through the setup process quickly because he was in a rush and had an upcoming meeting he had to attend. After installing the program Dan noticed a legitimate game was also installed when browsing through his program folder later that day. Based on the reference material above, what is likely the reason that the game was installed on to Dan’s computer?
- Trojan Horse
- Bundleware
- Adware
- Worm
Budleware
True or False: A device is only vulnerable to adware when the user downloads a program that contains adware.
False
Which of the following are attributes of adware?
- File Deletion
- Data Corruption
- Displays unwanted advertisements
- All of the above
- None of the above
Displays unwanted advertisements
Which of these is a common symptom of a computer that is infected with a virus?
- Slow performance
- Problems shutting down
- File pop ups
- All of the above
All of the above
After reading this reference material:
https://www.kaspersky.com/resource-center/definitions/drive-by-download
Drive By Downloads are designed to penetrate your device and carryout which of these functions?
- Spy on your activity
- Deliver Adware
- Hijack your Device
- Corrupt data or disable the device
- All of the above
All of the above
True or False: Worms need to attach themselves to a software program in order to be effective and inflict damage.
False
True or False: Regarding the development process, the development of a virus is not remotely similar to that of a normal piece of software.
False
A new first person shooter game is currently in the last few months of development and the developer just released a closed beta to all users who pre-ordered the upcoming title. While browsing Reddit, Sam found a link to a download of the closed beta. After downloading and installing the closed beta, Sam began noticing a lack of performance and constant crashing on his laptop. What is the file that Sam downloaded most likely to be?
- Trojan
- Adware
- Worm
- Spyware
Trojan
Fill in the blank: When a virus is embedded in the ________ it is constantly running in the background.
memory
What is a program that claims to be legitimate and harmless software, and instead is actually malicious software?
Trojan
Fill in the blank: _____ is unwanted software designed to present unwanted advertisements to the user.
adware
This type of malware silently infiltrates devices and can track user location, and obtain key strokes, phone calls, text message and email content.
- Adware
- Spyware
- Trojan
- Worm
Spyware
John a SOC analyst for a large Cybersecurity firm noticed that many of their clients users were experiencing performance loss, crashing, corrupted files and even firewall breaches in some cases. Later during the day, John noticed on Twitter that a lot of other people around the world were experiencing the same issues as his companies clients. What is the likely culprit that is effecting these users and their devices?
- Worm
- Trojan
- Spyware
- Adware
Worm
Regularly performing which of these tasks will help protect devices from viruses, worms and other malware?
- Running virus scans, putting the PC into sleep mode when not in use, updating software quarterly
- Running virus scans , deleting temporary files and cache, updating software regularly, maintaining regular backups
- Only using ethernet connection, running antivirus software, using an external HDD
- All of the Above
Running virus scans, deleting temporary files and cache, updating software regularly, maintaining regular backups
True or False: Trojans can jump from device to device, and are capable of infecting devices without any user actions involved.
False
Fill in the blank: If a virus is inserted in the _______, it runs when the computed goes through the boot process.
boot code
Which of these is classified as malware?
- Trojan Horse
- Spyware
- Worm
- None of the above
- All of the above
All of the above
True or False: Worms usually are designed to work off of weak points in programs.
True
This type of program is self-replicating.
- Worm
- Trojan Horse
- Spyware
- None of the above
Worm
True or False: Worms often carry payloads that do considerable damage.
True