Security Module 2 Flashcards

1
Q

What would be considered best practice in regards to malware circulation prevention?

A

Scan USB devices with anti-virus if you suspect infection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of malicious traffic is very hard to filter since it uses graphics to bypass text filters?

A

Image Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You notice slow network speeds across your site. Soon after you discover several PCs are suddenly having issues with a particular application. Which of the following is a likely culprit?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If an attacker uses a company’s system manual to try and identify weaknesses of an organization, the attacker most likely would have acquired this through which of the following?

A

Dumpster Diving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which is the most effective way to remove a root kit?

A

Reformat the hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is respnsible for the majority of spam on the internet?

A

Botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You receive an email from a web store you frequent and notice that the link in the message goes to a different domain the usual. Which of the following does this behavior most sound like?

A

Phishing attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What would be considered an example of pharming?

A

Your host file on your PC has been modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A student is able to modify their grades without detection. This could be accomplished through what means?

A

A keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If your anti-virus has fully updated its definition files, which of the following is it least likely to detect?

A

Metamorphic malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If an employee colludes with an attacker and lets him into the building, what is this attack method known as??

A

Piggybacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why is a worm more concerning to a network administrator than other more common types of malware?

A

It doesn’t require user intervention to spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is it important to know the exact URL of a website you are entering condifential information into?

A

To avoid typo squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which type of virus is capable of self-destructing if it detects common files used to research viruses on the PC?

A

Armored virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why would an attacker result to whaling as opposed to spear phishing?

A

Whaling is specfic to people that hold more valuable information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Programmers are known to use which vulnerability when accessing their programs during development?

A

Backdoor

17
Q

Which of the following would disallow virus circulation?

A

Attempts from a virus to spread a Macintosh computer from a Windows PC

18
Q

How does vishing differ from Phishing?

A

Vishing involves manipulating a user through a phone call

19
Q

How would an attacker lock a user’s PC by encrypting the entier hard drive and all attached storage devices?

A

By using ransomware

20
Q

Why would an angry employee who is leaving a company plant a logic bomb opposed to other types of malware?

A

He can set the malware to unleash its payload after he leaves