Practice Test 1 Flashcards
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Adware
Malware
Ransomware
Spyware
Malware
Which of the following statements apply to the definition of a computer virus? (Select 3 answers)
A self-replicating computer program containing malicious segment.
Requires its host application to be run to make the virus active.
A standalone malicious computer program that replicates itself over a computer network.
Can run by itself without any interaction.
Attaches itself to an application program or other executable component.
A self-contained malicious program or code that does need a host to propagate itself.
A self-replicating computer program containing malicious segment.
Requires its host application to be run to make the virus active.
Attaches itself to an application program or other executable component.
Which of the terms listed below refers to an example of a crypto-malware?
Backdoor
Ransomware
Keylogger
Rootkit
Ransomware
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:
Grayware
Adware
Ransomware
Spyware
Ransomware
A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:
Spyware
Worm
Trojan
Spam
Worm
A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.
True
False
True
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
Spyware
Backdoor
Trojan
Rootkit
Which of the following answers lists an example of spyware?
Keylogger
Vulnerability scanner
Computer worm
Packet sniffer
Keylogger
Akeyloggeris a technology that tracks and records consecutive key strokes on a keyboard. Because sensitive information such as usernames and passwords are often entered on a keyboard, akeyloggercan be a very dangerous technology.Keyloggersare often part of malware, spyware or an external virus.
What is adware?
Unsolicited or undesired electronic messages.
Malicious program that sends copies of itself to other computers on the network.
Software that displays advertisements.
Malicious software that collects information about users without their knowledge.
Software that displays advertisements.
Malicious software collecting information about users without their knowledge/consent is known as:
Crypto-malware
Adware
Ransomware
Spyware
Spyware
A malware-infected networked host under remote control of a hacker is commonly referred to as:
Trojan
Worm
Bot
Honeypot
Bot
Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack?
Honeynet
Botnet
Quarantine network
Malware
Botnet
Which type of Trojan enables unauthorized remote access to a compromised system?
pcap
RAT
MaaS
pfSense
RAT
A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer.RATsare usually downloaded invisibly with a user-requested program – such as a game – or sent as an email attachment.
Malicious code activated by a specific event is called:
Backdoor
Logic bomb
Dropper
Retrovirus
Logic bomb
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
Logic bomb
Trojan horse
Rootkit
Backdoor
Backdoor