Exam 2: Malware and Social Engineering Attacks
Exam 1: Introduction to Security50 Questions
Exam 2: Malware and Social Engineering Attacks50 Questions
Exam 3: Application and Networking-Based Attacks50 Questions
Exam 4: Host, Application, and Data Security50 Questions
Exam 5: Basic Cryptography50 Questions
Exam 6: Advanced Cryptography50 Questions
Exam 7: Network Security50 Questions
Exam 8: Administering a Secure Network50 Questions
Exam 9: Wireless Network Security50 Questions
Exam 10: Mobile Device Security50 Questions
Exam 11: Access Control Fundamentals50 Questions
Exam 12: Authentication and Account Management50 Questions
Exam 13: Business Continuity50 Questions
Exam 14: Risk Mitigation50 Questions
Exam 15: Vulnerability Assessment and Third Party Integration50 Questions
Select questions type
Match the following terms to the appropriate definitions.
-A false warning designed to trick users into changing security settings on their computer
(Multiple Choice)
4.9/5
(31)
Due to the prevalence of text filters for filtering spam, how have spammers modified their attacks?
(Essay)
4.9/5
(30)
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?
(Multiple Choice)
4.7/5
(35)
Match the following terms to the appropriate definitions.
-Computer code that lies dormant until it is triggered by a specific logical event
(Multiple Choice)
4.7/5
(32)
Match the following terms to the appropriate definitions.
-A computer virus that is written in a script known as a macro
(Multiple Choice)
4.8/5
(34)
Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious:
(Multiple Choice)
4.8/5
(37)
_______________ is a general term used to describe software that secretly spies on users by collecting information without their consent.
Match the following terms to the appropriate definitions.
(Short Answer)
4.9/5
(31)
Match the following terms to the appropriate definitions.
-A logical computer network of zombies under the control of an attacker.
(Multiple Choice)
4.9/5
(36)
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?
(Multiple Choice)
4.8/5
(35)
Which of the following is not one of the four methods for classifying the various types of malware?
(Multiple Choice)
4.8/5
(35)
Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.
(True/False)
4.9/5
(38)
Match the following terms to the appropriate definitions.
-Software code that gives access to a program or a service that circumvents normal security protections.
(Multiple Choice)
4.8/5
(31)
Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.
(True/False)
4.7/5
(29)
A macro is a series of instructions that can be grouped together as a single command.
(True/False)
4.8/5
(24)
The two types of malware that require user intervention to spread are:
(Multiple Choice)
4.8/5
(28)
In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.
(Short Answer)
4.7/5
(30)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)