AND CORRECT ANSWERS
What term below is used to describe the process of gathering information for an attack
by relying on the weaknesses of individuals? - Answer- Social Engineering
Which type of phishing attack targets specific users? - Answer- Spear Fishing
What type of structure is used to provide instructions to infected bot computers? -
Answer- Command & Control
A polymorphic virus changes its internal code to one of a set number of predefined
mutations whenever it is executed. - Answer- False
What type of malware consists of a set of software tools used by an attacker to hide the
actions or presence of other types of malicious software, such as a virus? - Answer-
Rootkit
Once the malware reaches a system through circulation, then it must embed itself into
that system. - Answer- True
Malware is software that enters a computer system with the user's knowledge or
consent and then performs an unwanted and harmful action. - Answer- True
A remote access Trojan has the basic functionality of a Trojan but also gives the threat
actor unauthorized remote access to the victim's computer by using specially configured
communication protocols. - Answer- True
What type of malicious software technology is used to download and install software
without the user's interaction? - Answer- Automated Download Software
What social engineering principal frightens and coerces a victim by using threats? -
Answer- Intimidation
Social engineering impersonation means to masquerade as a real or fictitious character
and then play out the role of that person on a victim. - Answer- True
What social engineering principal convinces a victim an immediate action is needed? -
Answer- Urgency