Malwares Flashcards

1
Q

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

A

EavesDropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The base-64 numbering system uses how many bits to represent a character?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

A

denial-of-service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware programs cannot be detected by antivirus programs.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Ping of Death is an exploit that sends multiple ICMP packets to a host faster than the host can handle. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

A

zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a programmer exploits written code that doesn’t check for a defined amount of memory space they are executing which of the following attacks?

A

buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following physical security methods provides the ability to secure a company’s assets and document any individuals physical time of entry?

A

card access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the main purpose of malware?

A

Financial gain or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following exploits might hide its destructive payload in a legitimate application or game?

A

Trojan program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Whitelisting allows only approved programs to run on a computer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of virus is used to lock a user’s system, or cloud accounts until the system’s owner complies by paying the attacker a monetary fee?

A

ransomware

17
Q

Which of the following doesn’t attach itself to a host but can replicate itself?

A

Worm

18
Q

Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?

A

heuristics

19
Q

Which of the following is an example of a macro programming language?

A

Visual Basic for Applications

20
Q

What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

A

virus

21
Q

Antivirus software should be updated annually. True or False?

A

False

22
Q

To reduce the risk of a virus attack on a network, you should do which of the following?

A

All of the above

23
Q

What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

A

Keyloggers

24
Q

The acronym IDS stands for which of the following?

A

Intrusion Detection System

25
Q

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

A

signatures

26
Q

Which of the following is a good place to begin your search for vulnerabilities in Microsoft products?

A

Microsoft Security Bulletins

27
Q

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

A

Network security

28
Q

An exploit that leaves an attacker with another way to compromise a network later is called which of the following? (Choose all that apply.)

A

Rootkit

Backdoor

29
Q

Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?

A

Session hijacking

30
Q

One purpose of adware is to determine users’ purchasing habits. True or False?

A

True