Exam 2: Malware and Social Engineering Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A ____ is a series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks.

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

B

How does a rootkit work?

Free
(Essay)
4.9/5
(36)
Correct Answer:
Verified

One approach used by rootkits is to alter or replace operating system files with modified versions that are specifically designed to ignore malicious activity. For example, on a computer the anti-malware software may be instructed to scan all files in a specific directory and in order to do this, the software will receive a list of those files from the operating system. A rootkit will replace the operating system's ability to retrieve a list of files with its own modified version that ignores specific malicious files. The anti-malware software assumes that the computer will willingly carry out those instructions and retrieve all files; it does not know that the computer is only displaying files that the rootkit has approved.

A(n) ____ virus adds a program to the operating system that is a malicious copycat version to a legitimate program.

Free
(Multiple Choice)
4.7/5
(33)
Correct Answer:
Verified

D

A ____ virus infects program executable files.

(Multiple Choice)
4.9/5
(43)
Match each item with a statement below:
executable program advertised as performing one activity, but actually does something else
Trojan
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Rootkit
general term that refers to a wide variety of damaging or annoying software programs
Spyware
Correct Answer:
Verified
Premises:
Responses:
executable program advertised as performing one activity, but actually does something else
Trojan
a program designed to take advantage of a vulnerability in an application or an operating system in order to enter a system
Rootkit
general term that refers to a wide variety of damaging or annoying software programs
Spyware
series of instructions that can be grouped together as a single command
Image spam
uses graphical images of text in order to circumvent text-based filters
Hoax
adds a program to the operating system that is a malicious copycat version to a legitimate program
Worm
general term used to describe software that violates a user's personal security
Malware
hides or removes traces of log-in records, log entries, and related processes
Companion virus
false warning, often contained in an e-mail message claiming to come from the IT department
Macro virus
(Matching)
4.8/5
(36)

Approximately two out of three malicious Web attacks have been developed using one of four popular attack toolkits.

(True/False)
4.8/5
(35)

Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.

(True/False)
4.8/5
(32)

____ is an image spam that is divided into multiple images.

(Multiple Choice)
4.9/5
(35)

What are some of the functions performed by viruses?

(Essay)
4.8/5
(28)

A ____ is a computer program or a part of a program that lies dormant until it is triggered by a specific logical event.

(Multiple Choice)
4.9/5
(35)

A computer ____ is malicious computer code that reproduces itself on the same computer.

(Multiple Choice)
4.8/5
(40)

Like a virus, a worm needs the user to perform an action such as starting a program or opening an e-mail attachment to start the infection.

(True/False)
4.8/5
(47)

A ____ is a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms.

(Multiple Choice)
5.0/5
(24)

A ____ virus infects the Master Boot Record of a hard disk drive.

(Multiple Choice)
4.9/5
(40)

The most popular attack toolkit, which has almost half of the attacker toolkit market is ____.

(Multiple Choice)
4.8/5
(31)

Attack toolkits range in price from only $400 to as much as $8,000.

(True/False)
4.8/5
(49)

Describe a macro virus.

(Essay)
5.0/5
(32)

A macro virus takes advantage of the "____________________" relationship between the application and the operating system.

(Short Answer)
4.7/5
(27)

There are almost ____ different Microsoft Windows file extensions that could contain a virus.

(Multiple Choice)
4.9/5
(40)

A(n) ____ refers to an undocumented, yet benign, hidden feature, that launches by entering a set of special commands, key combinations, or mouse clicks.

(Multiple Choice)
4.9/5
(37)
Showing 1 - 20 of 42
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)