Practice Test 1 Flashcards
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Adware
Malware
Ransomware
Spyware
Malware
Which of the following statements apply to the definition of a computer virus? (Select 3 answers)
A self-replicating computer program containing malicious segment.
Requires its host application to be run to make the virus active.
A standalone malicious computer program that replicates itself over a computer network.
Can run by itself without any interaction.
Attaches itself to an application program or other executable component.
A self-contained malicious program or code that does need a host to propagate itself.
A self-replicating computer program containing malicious segment.
Requires its host application to be run to make the virus active.
Attaches itself to an application program or other executable component.
Which of the terms listed below refers to an example of a crypto-malware?
Backdoor
Ransomware
Keylogger
Rootkit
Ransomware
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:
Grayware
Adware
Ransomware
Spyware
Ransomware
A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:
Spyware
Worm
Trojan
Spam
Worm
A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of.
True
False
True
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
Spyware
Backdoor
Trojan
Rootkit
Which of the following answers lists an example of spyware?
Keylogger
Vulnerability scanner
Computer worm
Packet sniffer
Keylogger
Akeyloggeris a technology that tracks and records consecutive key strokes on a keyboard. Because sensitive information such as usernames and passwords are often entered on a keyboard, akeyloggercan be a very dangerous technology.Keyloggersare often part of malware, spyware or an external virus.
What is adware?
Unsolicited or undesired electronic messages.
Malicious program that sends copies of itself to other computers on the network.
Software that displays advertisements.
Malicious software that collects information about users without their knowledge.
Software that displays advertisements.
Malicious software collecting information about users without their knowledge/consent is known as:
Crypto-malware
Adware
Ransomware
Spyware
Spyware
A malware-infected networked host under remote control of a hacker is commonly referred to as:
Trojan
Worm
Bot
Honeypot
Bot
Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack?
Honeynet
Botnet
Quarantine network
Malware
Botnet
Which type of Trojan enables unauthorized remote access to a compromised system?
pcap
RAT
MaaS
pfSense
RAT
A remote access Trojan (RAT) is a malware program that includes a back door for administrative control over the target computer.RATsare usually downloaded invisibly with a user-requested program – such as a game – or sent as an email attachment.
Malicious code activated by a specific event is called:
Backdoor
Logic bomb
Dropper
Retrovirus
Logic bomb
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
Logic bomb
Trojan horse
Rootkit
Backdoor
Backdoor
An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:
Shoulder surfing
Privilege escalation
Social engineering
Penetration testing
Social engineering
A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of: (Select all that apply) Phishing Watering hole attack Social engineering Bluejacking Vishing
Phishing
Social engineering
A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:
Phishing
Privilege escalation
Backdoor access
Shoulder surfing
Phishing
Phishing scams targeting a specific group of people are referred to as:
Vishing
Spear phishing
Spoofing
Whaling
Spear phishing
Phishing scams targeting people holding high positions in an organization or business are known as:
Vishing Bluesnarfing Whaling Bluejacking Pharming
Whaling
The practice of using a telephone system to manipulate user into disclosing confidential information is called:
Whaling
Spear phishing
Vishing
Pharming
Vishing
What is tailgating?
Acquiring unauthorized access to confidential data.
Looking over someone’s shoulder to get information.
Gaining unauthorized access to restricted areas by following another person.
Manipulating a user into disclosing confidential information.
Gaining unauthorized access to restricted areas by following another person.
Which social engineering attack relies on identity theft?
Impersonation
Dumpster diving
Watering hole attack
Shoulder surfing
Impersonation
“In computer security, the term ““Dumpster diving”” is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the company and other data can be used to facilitate social engineering attacks. Having the documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks.”
True
False
True
A situation in which an unauthorized person can view another user's display or keyboard to learn their password or other confidential information is referred to as: Spear phishing Tailgating Shoulder surfing Spoofing
Shoulder surfing