Cyber Quiz 2

25 July 2022
4.7 (114 reviews)
50 test answers

Unlock all answers in this set

Unlock answers (46)
question
Spreading similarly to a virus, a worm inserts malicious code into a program or data file.
answer
true
question
Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.
answer
true
question
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
answer
true
question
Successful attacks on computers today consist of a single element, malicious​ software programs that are created to infiltrate computers with the intent to do harm
answer
false
question
A macro is a series of instructions that can be grouped together as a single command.​
answer
true
question
What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?
answer
social engineering
question
The two types of malware that require user intervention to spread are:
answer
viruses and trojens
question
Which of the following is malicious computer code that reproduces itself on the same computer?
answer
viruses
question
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?
answer
swiss cheese
question
What type of malware is heavily dependent on a user in order to spread?
answer
virus
question
A virus that infects an executable program file is known as?
answer
program virus
question
How many different Microsoft Windows file types can be infected with a virus?
answer
70
question
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
answer
a marco
question
Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious
answer
trojen
question
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?
answer
rootkit
question
Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event is known as a?
answer
logic bomb
question
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?
answer
easter egg
question
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
answer
adware
question
What is the term used to describe unsolicited messages received on instant messaging software?
answer
spim
question
Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?
answer
oligomorphic malware
question
Which of the following is not one of the four methods for classifying the various types of malware?​
answer
source
question
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?​
answer
watering hole
question
The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?
answer
tailgating
question
What type of system security malware allows for access to a computer, program, or service without authorization?
answer
backdoor
question
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:​
answer
ransoware
question
Malicious software, or ____________________, silently infiltrate computers with the intent to do harm
answer
malware
question
In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.
answer
split infection
question
A macro virus takes advantage of the "____________________" relationship between the application and the operating system.
answer
trust
question
A(n) ____________________ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.
answer
keylogger
question
_______________ is a general term used to describe software that secretly spies on users by collecting information without their consent.
answer
spyware
question
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
answer
adware
question
Computer code that lies dormant until it is triggered by a specific logical event
answer
logic bomb
question
A logical computer network of zombies under the control of an attacker.​
answer
botnet
question
A false warning designed to trick users into changing security settings on their computer​
answer
hoax
question
A phishing attack that uses telephone calls instead of e-mails.
answer
vishing
question
Software code that gives access to a program or a service that circumvents normal security protections.
answer
backdoor
question
A computer virus that is written in a script known as a macro
answer
marco virus
question
Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.​
answer
keylogger
question
A phishing attack that targets only specific users
answer
spear fishing
question
Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.​
answer
computer virus
question
What is malware?
answer
software that is intended to damage or disable computers and computer systems enters a computer system without the users knowledge
question
Explain how an appender infection works.
answer
The virus first appends itself to the end of a file then moves the first three bytes of the original file to the virus code and replaces them with a jump instruction pointing to the virus code then when the program is launched the jump instruction redirects control to the virus
question
What are some of the functions performed by viruses?
answer
erases files from hard drive turns off computers security settings makes copies of itself harms/ruins computer
question
Describe a macro virus.
answer
one of the most common data file viruses written in marco script a a bunch of instructions that can be grouped together as one demand
question
What is a worm?
answer
a stand alone malware computer program that replicates itself in order to spread to other computers
question
How does a rootkit work?
answer
hides the existence of certain processes or programs on a computer from regular detection methods allowing it or another malicious process to access the computer
question
What is a backdoor and what is it used for?
answer
a backdoor gives an attacker access to a computer, program, or service that has any normal security protections it is sometimes used for developers who want to bypass security settings until their program is finalized but its also use by attackers to bypass security settings for their own reasoning
question
What are botnets?
answer
a network of private computers infected with malicious software
question
Describe adware.
answer
a form of malware which presents unwanted advertisements to the user of a computer
question
Due to the prevalence of text filters for filtering spam, how have spammers modified their attacks?
answer
they replace the text with a picture because text filters cannot filter out txt on a picture