J05: Information System Threats (PE) Flashcards
True or False: Trojans can often contain adware or Spyware.
True
Slammer and Code Red are examples of what type of malware?
- Trojan
- Adware
- Worm
- Spyware
worm
PFC Smith needs to sign his monthly counseling statement by tomorrow morning and has had difficulty finding a free PDF application that will allow him to digitally sign it. While browsing the internet, PFC Smith finds a link to a free PDF reader that claims that this PDF reader is the best free PDF available. After downloading and attempting to use the PDF reader to sign his document, PFC Smith noticed a large amount of popups occurring related to his recent search history. What is most likely effecting his computer?
- Trojan
- Spyware
- Adware
- None of the above
Adware
True or False: Worms are easily contained.
False
True or False: A virus is a small piece of software that piggybacks off of a real program.
True
After reading this reference material:
https://www.kaspersky.com/resource-center/definitions/drive-by-download
Dan installs SuperScrubberAntiVirus antivirus software on his new computer. While installing the software on to the computer, Dan did not read the End User Agreement and clicked through the setup process quickly because he was in a rush and had an upcoming meeting he had to attend. After installing the program Dan noticed a legitimate game was also installed when browsing through his program folder later that day. Based on the reference material above, what is likely the reason that the game was installed on to Dan’s computer?
- Trojan Horse
- Bundleware
- Adware
- Worm
Budleware
True or False: A device is only vulnerable to adware when the user downloads a program that contains adware.
False
Which of the following are attributes of adware?
- File Deletion
- Data Corruption
- Displays unwanted advertisements
- All of the above
- None of the above
Displays unwanted advertisements
Which of these is a common symptom of a computer that is infected with a virus?
- Slow performance
- Problems shutting down
- File pop ups
- All of the above
All of the above
After reading this reference material:
https://www.kaspersky.com/resource-center/definitions/drive-by-download
Drive By Downloads are designed to penetrate your device and carryout which of these functions?
- Spy on your activity
- Deliver Adware
- Hijack your Device
- Corrupt data or disable the device
- All of the above
All of the above
True or False: Worms need to attach themselves to a software program in order to be effective and inflict damage.
False
True or False: Regarding the development process, the development of a virus is not remotely similar to that of a normal piece of software.
False
A new first person shooter game is currently in the last few months of development and the developer just released a closed beta to all users who pre-ordered the upcoming title. While browsing Reddit, Sam found a link to a download of the closed beta. After downloading and installing the closed beta, Sam began noticing a lack of performance and constant crashing on his laptop. What is the file that Sam downloaded most likely to be?
- Trojan
- Adware
- Worm
- Spyware
Trojan
Fill in the blank: When a virus is embedded in the ________ it is constantly running in the background.
memory
What is a program that claims to be legitimate and harmless software, and instead is actually malicious software?
Trojan