Exam 2: Malware and Social Engineering Attacks
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
A ____ virus is loaded into random access memory (RAM) each time the computer is turned on and infects files that are opened by the user or the operating system.
(Multiple Choice)
4.9/5
(29)
____ uses "speckling" and different colors so that no two spam e-mails appear to be the same.
(Multiple Choice)
4.9/5
(30)
____ is when an attacker tricks users into giving out information or performing a compromising action.
(Multiple Choice)
4.9/5
(30)
____ involves horizontally separating words, although it is still readable by the human eye.
(Multiple Choice)
4.8/5
(40)
Unlike other malware, a ____ is heavily dependent upon the user for its survival.
(Multiple Choice)
4.8/5
(26)
The _________________________ contains the program necessary for the computer to start up and a description of how the hard drive is organized (the partition table).
(Short Answer)
4.8/5
(30)
The two types of malware that have the primary objective of spreading are ____.
(Multiple Choice)
4.8/5
(26)
Malicious software, or ____________________, silently infiltrate computers with the intent to do harm.
(Short Answer)
4.8/5
(27)
A ____ is a program advertised as performing one activity but actually does something else.
(Multiple Choice)
4.8/5
(39)
In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.
(Short Answer)
4.9/5
(35)
A(n) ____________________ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.
(Short Answer)
4.8/5
(40)
In a(n) ____ infection, a virus injects itself into the program's executable code instead of at the end of the file.
(Multiple Choice)
4.8/5
(40)
Removing a rootkit from an infected computer is extremely difficult.
(True/False)
4.8/5
(39)
____ is a software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
(Multiple Choice)
4.7/5
(30)
Showing 21 - 40 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)