Information System Threats Flashcards

1
Q

True or False: Trojans can often contain adware or Spyware.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Slammer and Code Red are examples of what type of malware?

Trojan
Adware
Worm
Spyware

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PFC Smith needs to sign his monthly counseling statement by tomorrow morning and has had difficulty finding a free PDF application that will allow him to digitally sign it. While browsing the internet, PFC Smith finds a link to a free PDF reader that claims that this PDF reader is the best free PDF available. After downloading and attempting to use the PDF reader to sign his document, PFC Smith noticed a large amount of popups occurring related to his recent search history. What is most likely effecting his computer?

Trojan
Spyware
Adware
None of the above

A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: Worms are easily contained.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

True or False: A virus is a small piece of software that piggybacks off of a real program.

True
False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

After reading this reference material:
https://www.kaspersky.com/resource-center/definitions/drive-by-download
Dan installs SuperScrubberAntiVirus antivirus software on his new computer. While installing the software on to the computer, Dan did not read the End User Agreement and clicked through the setup process quickly because he was in a rush and had an upcoming meeting he had to attend. After installing the program Dan noticed a legitimate game was also installed when browsing through his program folder later that day. Based on the reference material above, what is likely the reason that the game was installed on to Dan’s computer?

Trojan Horse
Bundleware
Adware
Worm

A

Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

True or False: A device is only vulnerable to adware when the user downloads a program that contains adware.

True
False

A

False: When a user is on a site that is infected with adware, which takes advantage of a vulnerability in the user’s web browser to deliver a drive-by download.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following are attributes of adware?

 File Deletion
 Data Corruption
 Displays unwanted advertisements
 All of the above
 None of the above
A

Displays unwanted advertisements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of these is a common symptom of a computer that is infected with a virus?

Slow performance
Problems shutting down
File pop ups
All of the above

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

After reading this reference material:

https://www.kaspersky.com/resource-center/definitions/drive-by-download

Drive By Downloads are designed to penetrate your device and carryout which of these functions?

 Spy on your activity
 Deliver Adware
 Hijack your Device
 Corrupt data or disable the device
 All of the above
A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or False: Worms need to attach themselves to a software program in order to be effective and inflict damage.

True
False

A

False: Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

True or False: Regarding the development process, the development of a virus is not remotely similar to that of a normal piece of software.

True
False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A new first person shooter game is currently in the last few months of development and the developer just released a closed beta to all users who pre-ordered the upcoming title. While browsing Reddit, Sam found a link to a download of the closed beta. After downloading and installing the closed beta, Sam began noticing a lack of performance and constant crashing on his laptop. What is the file that Sam downloaded most likely to be?

Trojan
Adware
Worm
Spyware

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank: When a virus is embedded in the ________ it is constantly running in the background.

A

Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a program that claims to be legitimate and harmless software, and instead is actually malicious software?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank: _____ is unwanted software designed to present unwanted advertisements to the user.

A

Adware

17
Q

This type of malware silently infiltrates devices and can track user location, and obtain key strokes, phone calls, text message and email content.

Adware
Spyware
Trojan
Worm

A

Spyware

18
Q

John a SOC analyst for a large Cybersecurity firm noticed that many of their clients users were experiencing performance loss, crashing, corrupted files and even firewall breaches in some cases. Later during the day, John noticed on Twitter that a lot of other people around the world were experiencing the same issues as his companies clients. What is the likely culprit that is effecting these users and their devices?

Worm
Trojan
Spyware
Adware

A

Worm

19
Q

Regularly performing which of these tasks will help protect devices from viruses, worms and other malware?

Running virus scans, putting the PC into sleep mode when not in use, updating software quarterly
Running virus scans , deleting temporary files and cache, updating software regularly, maintaining regular backups
Only using ethernet connection, running antivirus software, using an external HDD
All of the Above

A

Running virus scans , deleting temporary files and cache, updating software regularly, maintaining regular backups

20
Q

True or False: Trojans can jump from device to device, and are capable of infecting devices without any user actions involved.

True
False

A

False: Worm

21
Q

Fill in the blank: If a virus is inserted in the _______, it runs when the computed goes through the boot process.

A

boot code

22
Q

Which of these is classified as malware?

 Trojan Horse
 Spyware
 Worm
 None of the above
 All of the above
A

All of the above

23
Q

True or False: Worms usually are designed to work off of weak points in programs.

True
False

A

True

24
Q

This type of program is self-replicating.

Worm
Trojan Horse
Spyware
None of the above

A

Worm

25
Q

True or False: Worms often carry payloads that do considerable damage.

True
False

A

True