Security + Chapter 2

8 March 2023
4.9 (143 reviews)
20 test answers

Unlock all answers in this set

Unlock answers (16)
question
virus
answer
Which type of malware requires a user to transport it from one computer to another?worm adware rootkit virus
question
it displays the attacker's programming skills
answer
Each of these is a reason why adware is scorned EXCEPT _____. it displays objectionable content it can interfere with a user's productivity it displays the attacker's programming skills it can cause a computer to crash or slow down
question
a smaller group of specific users
answer
A watering hole attack is directed against which of the following? all users of a large corporation attackers who send spam a smaller group of specific users wealthy individuals
question
Tailgating
answer
Which of the following is defined as following an authorized person through a secure door? Tagging Backpacking Caboosing Tailgating
question
Send spam email to Moa's inbox on Tuesday.
answer
Which of these could NOT be defined as a logic bomb? If the company's stock price drops below $100, then credit Juni's account with 10 additional years of retirement credit. Reformat the hard drive three months after Sigrid left the company. Send spam email to Moa's inbox on Tuesday. Erase all data if Matilda's name is removed from the list of employees.
question
Intimidation
answer
Lykke receives a call while working at the helpdesk from someone who needs his account reset immediately. When Lykke questions the caller, he says, "If you don't reset my account immediately, I will call your supervisor!" What psychological approach is the caller attempting to use on Lykke? Scarcity Intimidation Familiarity Consensus
question
Command and control (C&C) server
answer
What is the name of the threat actor's computer that gives instructions to an infected computer? Regulating Net Server (RNS) Command and control (C&C) server Resource server Monitoring and Infecting (M&I) server
question
A hoax could convince a user that a bad Trojan
answer
How can an attacker use a hoax? Hoaxes are not used by attackers today. A user who receives multiple hoaxes could contact his supervisor for help. A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings. By sending out a hoax, an attacker can convince a user to read his email more often.
question
Crypto-malware
answer
Astrid's computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which time she will receive a means to unlock the files. What type of malware has infected her computer? Crypto-malware Blocking virus Bitcoin malware Networked worm
question
spyware
answer
Which of these is a general term used for describing software that gathers information without the user's consent? scrapeware gatherware spyware adware
question
blocking ransomware
answer
Linnea's father called her to say that a message suddenly appeared on his screen that says his software license has expired and he must immediately pay $500 to have it renewed before control of the computer will be returned to him. What type of malware is this? lockoutware blocking ransomware Trojanware persistent virusware
question
Software keyloggers are generally easy to detect.
answer
Which statement regarding a keylogger is NOT true? Software keyloggers can be designed to send captured information automatically back to the attacker through the Internet. Software keyloggers are generally easy to detect. Hardware keyloggers are installed between the keyboard connector and computer keyboard USB port. Keyloggers can be used to capture passwords, credit card numbers, or personal information.
question
diffusion
answer
Which of the following is NOT a primary trait of malware? concealment diffusion infection circulation
question
RAT
answer
Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free program to receive weather reports, but the program had also installed malware on the computer that gave the threat actor unrestricted access to the computer. What type of malware had been downloaded? virus ransomware RAT Trojan
question
books
answer
Which of these items retrieved through dumpster diving would NOT provide useful information? memos calendars books organizational charts
question
A rootkit is always the payload of a Trojan.
answer
Which of the following is NOT correct about a rootkit? A rootkit is always the payload of a Trojan. A rootkit accesses "lower layers" of the operating system. A rootkit is able to hide its presence or the presence of other malware. The risk of a rootkit is less today than previously.
question
Whaling
answer
Which variation of a phishing attack sends phishing messages only to wealthy individuals? Target phishing Spear phishing Microing Whaling
question
bot herder
answer
What is the term used for a threat actor who controls multiple bots in a botnet? zombie shepherd rogue IRC bot herder cyber-robot
question
impersonation
answer
Hedda pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Hedda performed? duplicity impersonation luring aliasing
question
metamorphic
answer
Which type of mutation completely changes a virus from its original form by rewriting its own code whenever it is executed? metamorphic oligomorphic polymorphic betamorphic