Exam 2: Malware and Social Engineering Attacks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Phishing is sending an email or displaying a web announcement that falsely claims to be from a legitimate enterprise in an attempt to trick the user into surrendering private information.

Free
(True/False)
4.8/5
(30)
Correct Answer:
Verified

True

Two types of malware have the primary trait of circulation.These are viruses and worms.

Free
(True/False)
5.0/5
(37)
Correct Answer:
Verified

True

Select the term used to describe tracking software that is deployed without the consent or control of the user.

Free
(Multiple Choice)
4.9/5
(39)
Correct Answer:
Verified

C

What social engineering principal frightens and coerces a victim by using threats?

(Multiple Choice)
4.9/5
(32)

Social engineering impersonation means to masquerade as a real or fictitious character and then play out the role of that person on a victim.

(True/False)
4.8/5
(37)

What type of malicious software technology is used to monitor user behavior or gather information about the user,sometimes including personally identifiable or other sensitive information?

(Multiple Choice)
4.9/5
(37)

What type of undocumented yet benign hidden feature launches after a special set of commands,key combinations,or mouse clicks?

(Multiple Choice)
4.9/5
(33)

Describe adware.

(Essay)
4.8/5
(41)

What is a backdoor and what is it used for?

(Essay)
4.8/5
(33)

Describe a macro virus.

(Essay)
4.9/5
(44)

What type of software can be installed in an individual's web browser to prevent ads from displaying?

(Multiple Choice)
4.9/5
(37)

How many different Microsoft Windows file types can be infected with a virus?

(Multiple Choice)
4.7/5
(39)

What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software,such as a virus?

(Multiple Choice)
4.9/5
(33)

What type of attack is targeted against a smaller group of specific individuals,such as the major executives working for a manufacturing company?

(Multiple Choice)
4.8/5
(42)

What type of ransomware displays a screen and prevents the user from accessing the computer's resources?

(Multiple Choice)
4.9/5
(29)

How does a rootkit work?

(Essay)
4.7/5
(27)

Select below the type of malware that appears to have a legitimate use,but contains something malicious:

(Multiple Choice)
4.9/5
(32)

What are botnets?

(Essay)
4.9/5
(38)

A virus that infects an executable program file is known as?

(Multiple Choice)
4.8/5
(38)

What type of structure is used to provide instructions to infected bot computers?

(Multiple Choice)
4.7/5
(32)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)