Security Fundamentals
What word is the currently accepted term to refer to network-connected hardware devices?
a. Host
b. Endpoint
c. Device
d. Client - ANSWERSEndpoint
Which of the following is NOT a characteristic of malware?
a. Deceive
b. Launch
c. Imprison
d. Diffusion - ANSWERSDiffusion
Gabriel's sister called him about a message that suddenly appeared on her screen that says her
software license has expired and she must immediately pay $500 to have it renewed before
control of the computer will be returned to her. What type of malware has infected her
computer?
a. Persistent lockware
b. Blocking ransomware
c. Cryptomalware
d. Impede-ware - ANSWERSBlocking ransomware
Marius's team leader has just texted him that an employee, who violated company policy by
bringing in a file on her USB flash drive, has just reported that her computer is suddenly locked
up with cryptomalware. Why would Marius consider this a dangerous situation?
,a. It sets a precedent by encouraging other employees to violate company policy. Review
Questions
b. Cryptomalware can encrypt all files on any network that is connected to the employee's
computer.
c. The organization may be forced to pay up to $500 for the ransom.
d. The employee would have to wait at least an hour before her computer could be restored. -
ANSWERSCryptomalware can encrypt all files on any network that is connected to the
employee's computer.
Which type of malware relies on LOLBins?
a. PUP
b. File-based virus
c. Fileless virus
d. Bot - ANSWERSFileless virus
Which of the following is known as a network virus?
a. TAR
b. Worm
c. Remote exploitation virus (REV)
d. C& - ANSWERSWorm
Josh is researching the different types of attacks that can be generated through a botnet. Which
of the following would NOT be something distributed by a botnet?
a. LOLBins
, b. Spam
c. Malware
d. Ad fraud - ANSWERSLOLBins
Which of the following is NOT a means by which a bot communicates with a C&C device?
a. Signing in to a website the bot herder operates
b. Signing in to a third-party website
c. Email
d. Command sent through Twitter posts - ANSWERSEmail
Randall's roommate is complaining to him about all of the software that came pre-installed on
his new computer. He doesn't want the software because it slows down the computer. What
type of software is this?
a. Spyware
b. BOT
c. PUP
d. Keylogger - ANSWERSPUP
What is the difference between a Trojan and a RAT?
a. There is no difference.
b. A RAT gives the attacker unauthorized remote access to the victim's computer.
c. A Trojan can carry malware while a RAT cannot.
d. A RAT can infect only a smartphone and not a computer - ANSWERSA RAT gives the attacker
unauthorized remote access to the victim's computer.
Which of these would NOT be considered the result of a logic bomb?