Terms in this set (43)
A user used an administrator The user installed Trojan horse malware.
account to download and install a
software
application. After the user launched
the
.exe extension installer
file, the user experienced
frequent crashes, slow
computer performance, and strange
new services running when
turning on the
computer. It seems like there are
more and more services
running over time. What most
likely happened to cause these
issues?
A security operations center (SOC) A worm
analyst investigates the
propagation of a memory-
resident virus across the
network and notices a rapid
consumption of network
bandwidth, causing a Denial of
Service
(DoS). What type of virus is this?
, A user purchased a laptop PUP
from a local computer shop.
After powering on the
laptop for the first time, the user
noticed a few programs like
Norton Antivirus asking for
permission to install. How
would an IT
security specialist classify these
programs?
A fileless malicious software -Uses lightweight shellcode
can replicate between -Uses low observable characteristic attacks
processes in memory on a local
host or over network shares.
What other behaviors and
techniques would classify
malware as fileless rather
than a normal virus? (Select
all that apply.)
An attacker is planning to set -Computer Bots
up a backdoor that will infect a -Command & Control
set of specific computers at an
organization, to inflict a set of
other intrusion attacks
remotely. Which of the
following will support the
attackers' plan? (Select all that
apply.)
If a user's computer becomes -Launch a Distributed Denial of Service (DDoS) attack
infected with malware and used -Launch a mass-mail spam attack
as part of a botnet, which of the -Establish a connection with a Command and Control server
following actions can be
initiated by the attacker? (Select all
that apply.)