Threats PEs Flashcards
Slammer and Code Red are examples of what type of malware?
Worm
PFC Smith needs to sign his monthly counseling statement by tomorrow morning and has had difficulty finding a free PDF application that will allow him to digitally sign it. While browsing the internet, PFC Smith finds a link to a free PDF reader that claims that this PDF reader is the best free PDF available. After downloading and attempting to use the PDF reader to sign his document, PFC Smith noticed a large amount of popups occurring related to his recent search history. What is most likely effecting his computer?
Adware
True or False: Worms are easily contained.
False
True or False: A virus is a small piece of software that piggybacks off of a real program.
True
After reading this reference material:
https://www.kaspersky.com/resource-center/definitions/drive-by-download
Dan installs SuperScrubberAntiVirus antivirus software on his new computer. While installing the software on to the computer, Dan did not read the End User Agreement and clicked through the setup process quickly because he was in a rush and had an upcoming meeting he had to attend. After installing the program Dan noticed a legitimate game was also installed when browsing through his program folder later that day. Based on the reference material above, what is likely the reason that the game was installed on to Dan’s computer?
Bundleware
True or False: A device is only vulnerable to adware when the user downloads a program that contains adware.
False
Which of the following are the bare minimal attributes of adware?
Displays unwanted advertisements
Which of these is a common symptom of a computer that is infected with a virus?
- Slow performance
- Problems shutting down
- File pop ups
- All of the above
All of the above
After reading this reference material:
https://www.kaspersky.com/resource-center/definitions/drive-by-download
Drive By Downloads are designed to penetrate your device and carryout which of these functions?
- Spy on your activity
- Deliver Adware
- Hijack your Device
- Corrupt data or disable the device
- All of the above
True or False: Worms need to attach themselves to a software program in order to be effective and inflict damage.
False
True or False: Regarding the development process, the development of a virus is not remotely similar to that of a normal piece of software.
False
A new first person shooter game is currently in the last few months of development and the developer just released a closed beta to all users who pre-ordered the upcoming title. While browsing Reddit, Sam found a link to a download of the closed beta. After downloading and installing the closed beta, Sam began noticing a lack of performance and constant crashing on his laptop. What is the file that Sam downloaded most likely to be?
Trojan
Fill in the blank: When a virus is embedded in the ________ it is constantly running in the background.
Memory
What is a program that claims to be legitimate and harmless software, and instead is actually malicious software?
Trojan
Fill in the blank: _____ is unwanted software designed to present unwanted advertisements to the user.
Adware