A group of compromised computers that have software installed by a worm or Trojan is
known as what? - Answer Botnet
Which of the following computer security threats can be updated automatically and
remotely?
Virus
Worm
Zombie
Malware - Answer Zombie
You have been given the task of scanning for viruses on a PC. What is the best of the
following methods?
Recovery environment
Dual-boot into Linux
Command Prompt only
Boot into Windows normally - Answer Recovery environment
Which of the following is a common symptom of spyware?
Infected files
Computer shuts down
Applications freeze
Pop-up windows - Answer Pop-up windows
Stan the man is a network administrator. One day he notices that his DHCP server is
flooded with information. he analyzes it and finds that the information is coming from
more than 50 computers on the network. Which of the following is the most likely
reason?
Virus
Worm
Zombie
PHP script - Answer Worm
Which of the following is not an example of malicious software?
Rootkits
Spyware
Viruses
Browser - Answer Browser
What type of attack uses more than one computer? - Answer DDoS
What is a malicious attack that executes at the same time every week? - Answer Logic
bomb