Malwares Flashcards

1
Q

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

A

EavesDropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The base-64 numbering system uses how many bits to represent a character?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of attack cripples the network and prevents legitimate users from accessing network resources?

A

denial-of-service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware programs cannot be detected by antivirus programs.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Ping of Death is an exploit that sends multiple ICMP packets to a host faster than the host can handle. True or False?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

A

zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a programmer exploits written code that doesn’t check for a defined amount of memory space they are executing which of the following attacks?

A

buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following physical security methods provides the ability to secure a company’s assets and document any individuals physical time of entry?

A

card access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?

A

social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the main purpose of malware?

A

Financial gain or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If an attacker wishes to collect confidential financial data, passwords, PINs and any personal data stored on your computer which of the following programs would they choose to use?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following exploits might hide its destructive payload in a legitimate application or game?

A

Trojan program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Whitelisting allows only approved programs to run on a computer.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Trojan Programs can install a specific type of program to allow an attacker access to the attacked computer later. What means of access is the attacker utilizing?

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of virus is used to lock a user’s system, or cloud accounts until the system’s owner complies by paying the attacker a monetary fee?

A

ransomware

17
Q

Which of the following doesn’t attach itself to a host but can replicate itself?

18
Q

Which term best describes malicious programmatic behaviors that antivirus software companies use to compare known viruses to every file on a computer?

A

heuristics

19
Q

Which of the following is an example of a macro programming language?

A

Visual Basic for Applications

20
Q

What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

21
Q

Antivirus software should be updated annually. True or False?

22
Q

To reduce the risk of a virus attack on a network, you should do which of the following?

A

All of the above

23
Q

What type of hardware devices and computer programs can be used to obtain passwords by capturing key strokes on a targeted computer system?

A

Keyloggers

24
Q

The acronym IDS stands for which of the following?

A

Intrusion Detection System

25
Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?
signatures
26
Which of the following is a good place to begin your search for vulnerabilities in Microsoft products?
Microsoft Security Bulletins
27
Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?
Network security
28
An exploit that leaves an attacker with another way to compromise a network later is called which of the following? (Choose all that apply.)
Rootkit | Backdoor
29
Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?
Session hijacking
30
One purpose of adware is to determine users' purchasing habits. True or False?
True