Security Module 2 Flashcards
What would be considered best practice in regards to malware circulation prevention?
Scan USB devices with anti-virus if you suspect infection
What type of malicious traffic is very hard to filter since it uses graphics to bypass text filters?
Image Spam
You notice slow network speeds across your site. Soon after you discover several PCs are suddenly having issues with a particular application. Which of the following is a likely culprit?
Worm
If an attacker uses a company’s system manual to try and identify weaknesses of an organization, the attacker most likely would have acquired this through which of the following?
Dumpster Diving
Which is the most effective way to remove a root kit?
Reformat the hard drive
Which of the following is respnsible for the majority of spam on the internet?
Botnets
You receive an email from a web store you frequent and notice that the link in the message goes to a different domain the usual. Which of the following does this behavior most sound like?
Phishing attack
What would be considered an example of pharming?
Your host file on your PC has been modified
A student is able to modify their grades without detection. This could be accomplished through what means?
A keylogger
If your anti-virus has fully updated its definition files, which of the following is it least likely to detect?
Metamorphic malware
If an employee colludes with an attacker and lets him into the building, what is this attack method known as??
Piggybacking
Why is a worm more concerning to a network administrator than other more common types of malware?
It doesn’t require user intervention to spread
Why is it important to know the exact URL of a website you are entering condifential information into?
To avoid typo squatting
Which type of virus is capable of self-destructing if it detects common files used to research viruses on the PC?
Armored virus
Why would an attacker result to whaling as opposed to spear phishing?
Whaling is specfic to people that hold more valuable information