J05: Information System Threats (PE) Flashcards

1
Q

True or False: Trojans can often contain adware or Spyware.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Slammer and Code Red are examples of what type of malware?

  • Trojan
  • Adware
  • Worm
  • Spyware
A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PFC Smith needs to sign his monthly counseling statement by tomorrow morning and has had difficulty finding a free PDF application that will allow him to digitally sign it. While browsing the internet, PFC Smith finds a link to a free PDF reader that claims that this PDF reader is the best free PDF available. After downloading and attempting to use the PDF reader to sign his document, PFC Smith noticed a large amount of popups occurring related to his recent search history. What is most likely effecting his computer?

  • Trojan
  • Spyware
  • Adware
  • None of the above
A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: Worms are easily contained.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: A virus is a small piece of software that piggybacks off of a real program.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After reading this reference material:
https://www.kaspersky.com/resource-center/definitions/drive-by-download
Dan installs SuperScrubberAntiVirus antivirus software on his new computer. While installing the software on to the computer, Dan did not read the End User Agreement and clicked through the setup process quickly because he was in a rush and had an upcoming meeting he had to attend. After installing the program Dan noticed a legitimate game was also installed when browsing through his program folder later that day. Based on the reference material above, what is likely the reason that the game was installed on to Dan’s computer?

  • Trojan Horse
  • Bundleware
  • Adware
  • Worm
A

Budleware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: A device is only vulnerable to adware when the user downloads a program that contains adware.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following are attributes of adware?

  • File Deletion
  • Data Corruption
  • Displays unwanted advertisements
  • All of the above
  • None of the above
A

Displays unwanted advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of these is a common symptom of a computer that is infected with a virus?

  • Slow performance
  • Problems shutting down
  • File pop ups
  • All of the above
A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

After reading this reference material:

https://www.kaspersky.com/resource-center/definitions/drive-by-download

Drive By Downloads are designed to penetrate your device and carryout which of these functions?

  • Spy on your activity
  • Deliver Adware
  • Hijack your Device
  • Corrupt data or disable the device
  • All of the above
A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: Worms need to attach themselves to a software program in order to be effective and inflict damage.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Regarding the development process, the development of a virus is not remotely similar to that of a normal piece of software.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A new first person shooter game is currently in the last few months of development and the developer just released a closed beta to all users who pre-ordered the upcoming title. While browsing Reddit, Sam found a link to a download of the closed beta. After downloading and installing the closed beta, Sam began noticing a lack of performance and constant crashing on his laptop. What is the file that Sam downloaded most likely to be?

  • Trojan
  • Adware
  • Worm
  • Spyware
A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank: When a virus is embedded in the ________ it is constantly running in the background.

A

memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a program that claims to be legitimate and harmless software, and instead is actually malicious software?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: _____ is unwanted software designed to present unwanted advertisements to the user.

A

adware

17
Q

This type of malware silently infiltrates devices and can track user location, and obtain key strokes, phone calls, text message and email content.

  • Adware
  • Spyware
  • Trojan
  • Worm
A

Spyware

18
Q

John a SOC analyst for a large Cybersecurity firm noticed that many of their clients users were experiencing performance loss, crashing, corrupted files and even firewall breaches in some cases. Later during the day, John noticed on Twitter that a lot of other people around the world were experiencing the same issues as his companies clients. What is the likely culprit that is effecting these users and their devices?

  • Worm
  • Trojan
  • Spyware
  • Adware
A

Worm

19
Q

Regularly performing which of these tasks will help protect devices from viruses, worms and other malware?

  • Running virus scans, putting the PC into sleep mode when not in use, updating software quarterly
  • Running virus scans , deleting temporary files and cache, updating software regularly, maintaining regular backups
  • Only using ethernet connection, running antivirus software, using an external HDD
  • All of the Above
A

Running virus scans, deleting temporary files and cache, updating software regularly, maintaining regular backups

20
Q

True or False: Trojans can jump from device to device, and are capable of infecting devices without any user actions involved.

A

False

21
Q

Fill in the blank: If a virus is inserted in the _______, it runs when the computed goes through the boot process.

A

boot code

22
Q

Which of these is classified as malware?

  • Trojan Horse
  • Spyware
  • Worm
  • None of the above
  • All of the above
A

All of the above

23
Q

True or False: Worms usually are designed to work off of weak points in programs.

A

True

24
Q

This type of program is self-replicating.

  • Worm
  • Trojan Horse
  • Spyware
  • None of the above
A

Worm

25
Q

True or False: Worms often carry payloads that do considerable damage.

A

True