Malwares Flashcards
What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?
EavesDropping
The base-64 numbering system uses how many bits to represent a character?
6
Which type of attack cripples the network and prevents legitimate users from accessing network resources?
denial-of-service
Malware programs cannot be detected by antivirus programs.
False
The Ping of Death is an exploit that sends multiple ICMP packets to a host faster than the host can handle. True or False?
False
When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?
zombies
When a programmer exploits written code that doesn’t check for a defined amount of memory space they are executing which of the following attacks?
buffer overflow
Which of the following physical security methods provides the ability to secure a company’s assets and document any individuals physical time of entry?
card access
A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?
social engineering
A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?
worm
What is the main purpose of malware?
Financial gain or destruction
If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?
Spyware
Which of the following exploits might hide its destructive payload in a legitimate application or game?
Trojan program
Whitelisting allows only approved programs to run on a computer.
True
Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?
backdoor
What type of virus is used to lock a user’s system, or cloud accounts until the system’s owner complies by paying the attacker a monetary fee?
ransomware
Which of the following doesn’t attach itself to a host but can replicate itself?
Worm
Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?
heuristics
Which of the following is an example of a macro programming language?
Visual Basic for Applications
What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?
virus
Antivirus software should be updated annually. True or False?
False
To reduce the risk of a virus attack on a network, you should do which of the following?
All of the above
What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?
Keyloggers
The acronym IDS stands for which of the following?
Intrusion Detection System
Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?
signatures
Which of the following is a good place to begin your search for vulnerabilities in Microsoft products?
Microsoft Security Bulletins
Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?
Network security
An exploit that leaves an attacker with another way to compromise a network later is called which of the following? (Choose all that apply.)
Rootkit
Backdoor
Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?
Session hijacking
One purpose of adware is to determine users’ purchasing habits. True or False?
True