Exam 2: Malware and Social Engineering Attacks
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Match the following terms to the appropriate definitions.
-Malicious computer code that, like its biological counterpart, reproduces itself on the same computer.
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
D
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
A
Describe adware.
Free
(Essay)
4.8/5
(36)
Correct Answer:
42. Adware delivers advertising content in a manner that is unexpected and unwanted by the user. Once it becomes installed, it typically displays advertising banners, popup ads, or opens new web browser windows at random intervals.
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?
(Multiple Choice)
4.7/5
(30)
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:
(Multiple Choice)
4.8/5
(28)
Match the following terms to the appropriate definitions.
-A phishing attack that uses telephone calls instead of e-mails.
(Multiple Choice)
4.8/5
(30)
Match the following terms to the appropriate definitions.
-A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
(Multiple Choice)
4.9/5
(30)
Malicious software, or ____________________, silently infiltrate computers with the intent to do harm.
(Short Answer)
4.7/5
(32)
What is the term used to describe unsolicited messages received on instant messaging software?
(Multiple Choice)
4.7/5
(37)
Spreading similarly to a virus, a worm inserts malicious code into a program or data file.
(True/False)
4.9/5
(38)
A macro virus takes advantage of the "____________________" relationship between the application and the operating system.
(Short Answer)
4.9/5
(32)
The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?
(Multiple Choice)
4.7/5
(30)
What type of system security malware allows for access to a computer, program, or service without authorization?
(Multiple Choice)
4.8/5
(43)
Match the following terms to the appropriate definitions.
-A phishing attack that targets only specific users
(Multiple Choice)
4.9/5
(33)
Which of the following is malicious computer code that reproduces itself on the same computer?
(Multiple Choice)
4.7/5
(39)
A virus that infects an executable program file is known as?
(Multiple Choice)
4.7/5
(39)
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
(Multiple Choice)
4.7/5
(34)
Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event is known as a?
(Multiple Choice)
4.9/5
(41)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)