Security+ Practice Test 1 Flashcards
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Malware
Which of the following statements apply to the definition of a computer virus?
A self-replicating computer program containing malicious segment
Requires its host application to be run to make the virus active
A standalone malicious computer program that replicates itself over a computer network
Can run by itself without any interaction
Attaches itself to an application program or other executable component
A self-contained malicious program or code that does need a host to propagate itself
A self-replicating computer program containing malicious segment
Requires its host application to be run to make the virus active
Attaches itself to an application program or other executable
Which of the terms listed below refers to an example of a crypto-malware? Backdoor Ransomware Keylogger Rootkit
Ransomware
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:
Ransomware
A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:
Worm
A type of software that performs unwanted and harmful actions in disguise of legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of. (True or False)
True
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
Which of the following answers lists an example of spyware? Keylogger Vulnerability scanner Computer worm Packet Sniffer
Keylogger
What is adware?
Software that displays advertisements
Malicious software collecting information about users without their knowledge/consent is known as:
Spyware
A malware-infected networked host under remote control of a hacker is commonly referred to as:
Bot
Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack? Honeynet Botnet Quarantine network Malware
Botnet
Which type of Trojan enables unauthorized remote access to a compromised system?
RAT
Malicious code activated by a specific event is called:
Logic Bomb
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
Backdoor