Security+ Practice Test 1 Flashcards

1
Q

Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following statements apply to the definition of a computer virus?
A self-replicating computer program containing malicious segment
Requires its host application to be run to make the virus active
A standalone malicious computer program that replicates itself over a computer network
Can run by itself without any interaction
Attaches itself to an application program or other executable component
A self-contained malicious program or code that does need a host to propagate itself

A

A self-replicating computer program containing malicious segment
Requires its host application to be run to make the virus active
Attaches itself to an application program or other executable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Which of the terms listed below refers to an example of a crypto-malware?
Backdoor
Ransomware
Keylogger
Rootkit
A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A type of software that performs unwanted and harmful actions in disguise of legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities, but apart from that it will also contain a portion of malicious code that the user is unaware of. (True or False)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Which of the following answers lists an example of spyware?
Keylogger
Vulnerability scanner
Computer worm
Packet Sniffer
A

Keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is adware?

A

Software that displays advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious software collecting information about users without their knowledge/consent is known as:

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A malware-infected networked host under remote control of a hacker is commonly referred to as:

A

Bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the terms listed below applies to a collection of intermediary compromised systems that are used as a platform for a DDoS attack?
Honeynet
Botnet
Quarantine network
Malware
A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of Trojan enables unauthorized remote access to a compromised system?

A

RAT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Malicious code activated by a specific event is called:

A

Logic Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

An unauthorized practice of obtaining confidential information by manipulating people into disclosing sensitive data is referred to as:

A

Social Engineering

17
Q

A fraudulent email requesting its recipient to reveal sensitive information (e.g. user name and password) used later by an attacker for the purpose of identity theft is an example of:

A

Phishing

Social Engineering

18
Q

A social engineering technique whereby attackers under disguise of legitimate request attempt to gain access to confidential information they shouldn’t have access to is commonly referred to as:

A

Phishing

19
Q

Phishing scams targeting a specific group of people are referred to as:

A

Spear phishing

20
Q

Phishing scams targeting people holding high positions in an organization of business are known as

A

Whaling

21
Q

The practice of using a telephone system to manipulate user into disclosing confidential information is called:

A

Vishing

22
Q

What is tailgating?

A

Gaining unauthorized access to restricted areas by following another person

23
Q

Which social engineering attack relies on identity theft?

A

Impersonation

24
Q

In computer security, the term “Dumpster diving” is used to describe a practice of sifting through trash for discarded documents containing sensitive data. Found documents containing names and surnames of the employees along with the information about positions held in the compnay and other data can be used to facilitate social engineering attacks. Having documents shredded or incinerated before disposal makes dumpster diving less effective and mitigates the risk of social engineering attacks. (True or False)

A

True

25
Q

A situation in which an unauthorized person can view another user’s display or keyboard to learn their password or other confidential information is referred to as:

A

Shoulder Surfing