(Multiple Choice)
Which of the following malware types may require user interaction, does not hide itself,
and is commonly
identified by marketing pop-ups based on browsing habits?
A. Botnet
B. Rootkit
C. Adware
D. Virus - Answer Correct Answer: C
Adware is free software that is supported by advertisements. Common adware
programs are toolbars, games and utilities. They are free to use, but require you to
watch advertisements as long as the programs are open. Adware typically requires an
active Internet connection to run.
A program has been discovered that infects a critical Windows system executable and
stays dormant in
memory. When a Windows mobile phone is connected to the host, the program infects
the phone's boot loader
and continues to target additional Windows PCs or phones. Which of the following
malware categories BEST
describes this program?
A. Zero-day
B. Trojan
C. Virus
D. Rootkit - Answer Correct Answer: C
A computer virus is a program or piece of code that is loaded onto your computer
without your knowledge and runs against your wishes. Viruses can also replicate
themselves. All computer viruses are man-made. A simple virus that can make a copy
of itself over and over again is relatively easy to produce. Even such a simple virus is
dangerous because it will quickly use all available memory and bring the system to a
halt. An even more dangerous type of virus is one capable of transmitting itself across
networks and bypassing security systems. Some people distinguish between general
viruses and worms. A worm is a special type of virus that can replicate itself and use
memory, but cannot attach itself to other programs.
A user casually browsing the Internet is redirected to a warez site where a number of
pop-ups appear. After
clicking on a pop-up to complete a survey, a drive-by download occurs. Which of the
following is MOST likely
to be contained in the download?
A. Backdoor
B. Spyware
, Domain 3 Threats and Vulnerabilities
(Multiple Choice)
C. Logic bomb
D. DDoS
E. Smurf - Answer Correct Answer: B
Spyware is software that is used to gather information about a person or organization
without their knowledge and sends that information to another entity. Whenever
spyware is used for malicious purposes, its presence is typically hidden from the user
and can be difficult to detect. Some spyware, such as keyloggers, may be installed by
the owner of a shared, corporate, or public computer intentionally in order to monitor
users.
Which of the following malware types typically allows an attacker to monitor a user's
computer, is
characterized by a drive-by download, and requires no user interaction?
A. Virus
B. Logic bomb
C. Spyware
D. Adware - Answer Correct Answer: C
Spyware is software that is used to gather information about a person or organization
without their knowledge and sends that information to another entity.
Sara, a user, downloads a keygen to install pirated software. After running the keygen,
system performance is
extremely slow and numerous antivirus alerts are displayed. Which of the following
BEST describes this type
of malware?
A. Logic bomb
B. Worm
C. Trojan
D. Adware - Answer Correct Answer: C
In computers, a Trojan is a program in which malicious or harmful code is contained
inside apparently harmless programming or data in such a way that it can get control
and do its chosen form of damage, such as ruining the file allocation table on your hard
disk. In one celebrated case, a Trojan was a program that was supposed to find and
destroy computer viruses. A Trojan horse may be widely redistributed as part of a
computer virus
During a server audit, a security administrator does not notice abnormal activity.
However, a network security
analyst notices connections to unauthorized ports from outside the corporate network.
Using specialized tools,