Exam 2: Malware and Social Engineering Attacks
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
B
How does a rootkit work?
Free
(Essay)
4.9/5
(36)
Correct Answer:
One approach used by rootkits is to alter or replace operating system files with modified versions that are specifically designed to ignore malicious activity. For example, on a computer the anti-malware software may be instructed to scan all files in a specific directory and in order to do this, the software will receive a list of those files from the operating system. A rootkit will replace the operating system's ability to retrieve a list of files with its own modified version that ignores specific malicious files. The anti-malware software assumes that the computer will willingly carry out those instructions and retrieve all files; it does not know that the computer is only displaying files that the rootkit has approved.
A(n) ____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program.
Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
D
Match each item with a statement below:
Correct Answer:
Premises:
Responses:
(Matching)
4.8/5
(36)
Approximately two out of three malicious Web attacks have been developed using one of four popular attack toolkits.
(True/False)
4.8/5
(35)
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
(True/False)
4.8/5
(32)
A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.
(Multiple Choice)
4.9/5
(35)
A computer ____ is malicious computer code that reproduces itself on the same computer.
(Multiple Choice)
4.8/5
(40)
Like a virus, a worm needs the user to perform an action such as starting a program or opening an e-mail attachment to start the infection.
(True/False)
4.8/5
(47)
A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms.
(Multiple Choice)
5.0/5
(24)
A ____ virus infects the Master Boot Record of a hard disk drive.
(Multiple Choice)
4.9/5
(40)
The most popular attack toolkit, which has almost half of the attacker toolkit market is ____.
(Multiple Choice)
4.8/5
(31)
Attack toolkits range in price from only $400 to as much as $8,000.
(True/False)
4.8/5
(49)
A macro virus takes advantage of the "____________________" relationship between the application and the operating system.
(Short Answer)
4.7/5
(27)
There are almost ____ different Microsoft Windows file extensions that could contain a virus.
(Multiple Choice)
4.9/5
(40)
A(n) ____ refers to an undocumented, yet benign, hidden feature, that launches by entering a set of special commands, key combinations, or mouse clicks.
(Multiple Choice)
4.9/5
(37)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)