Deck 10: Defending Against Trojan Horses,spyware,and Adware
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/26
Play
Full screen (f)
Deck 10: Defending Against Trojan Horses,spyware,and Adware
1
Which of the following is NOT an effective means of protecting against spyware?
A)Block all browser cookies or limit their duration.
B)Block scripts,applets,and other active programming in the Web browser.
C)Download files and programs to a separate folder until they are verified safe.
D)Never download any attachment unless expecting it or certain it is safe.
A)Block all browser cookies or limit their duration.
B)Block scripts,applets,and other active programming in the Web browser.
C)Download files and programs to a separate folder until they are verified safe.
D)Never download any attachment unless expecting it or certain it is safe.
C
2
What is the purpose of spyware?
A)To manage popups and prevent nuisance advertising.
B)To monitor a system,gain access to log on information,and allow access to from the outside.
C)To monitor a system,gather information,and make it available to another.
D)To prevent others from detecting the presence of your computer on the network.
A)To manage popups and prevent nuisance advertising.
B)To monitor a system,gain access to log on information,and allow access to from the outside.
C)To monitor a system,gather information,and make it available to another.
D)To prevent others from detecting the presence of your computer on the network.
C
3
What is the purpose of a Trojan horse?
A)To delete files.
B)To change registry keys.
C)To spy on a computer and report back to its origin.
D)To appear as a good program to ensure that it gets installed on a computer.
A)To delete files.
B)To change registry keys.
C)To spy on a computer and report back to its origin.
D)To appear as a good program to ensure that it gets installed on a computer.
D
4
Which is a product for identifying and removing spyware and adware?
A)Gator
B)RedSheriff
C)Spy Sweeper
D)Webroot
A)Gator
B)RedSheriff
C)Spy Sweeper
D)Webroot
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
5
A ____________ is an application that appears to have a good purpose but actually performs some malicious function.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
6
Which is probably the most frequent action of Trojan horse attacks?
A)Erasing files on a computer.
B)Installing back doors and executing DoS attacks.
C)Installing spyware and malware.
D)Searching for personal information.
A)Erasing files on a computer.
B)Installing back doors and executing DoS attacks.
C)Installing spyware and malware.
D)Searching for personal information.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
7
Which is one of the most famous Trojan horses?
A)Back Orifice
B)Dropper
C)NetBus
D)Util-Linux
A)Back Orifice
B)Dropper
C)NetBus
D)Util-Linux
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
8
Which adware product is involved in suing anti-spyware companies?
A)Gator
B)RedSheriff
C)Spybot
D)SpySweeper
A)Gator
B)RedSheriff
C)Spybot
D)SpySweeper
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
9
NetBus,Back Orifice and most similar Trojan horses are removed from an infected computer system by:
A)editing the registry.
B)installing a personal firewall.
C)scanning the system with an antivirus scanner.
D)scanning the system with anti-spyware software.
A)editing the registry.
B)installing a personal firewall.
C)scanning the system with an antivirus scanner.
D)scanning the system with anti-spyware software.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
10
A Trojan horse that spreads malware is also called a(n)____________.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
11
A Trojan horse application sometimes creates a ____________ that allows the originator an easy alternative access into a computer system.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
12
Which is spyware loaded from a Web page via Java and purported to be a simple marketing tool?
A)RedSheriff
B)Spybot
C)SpySweeper
D)Webroot
A)RedSheriff
B)Spybot
C)SpySweeper
D)Webroot
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
13
What is the best approach to preventing systems from being exploited by a Trojan horse?
A)Anti-spam software.
B)High security firewalls.
C)Software scanners.
D)Technological and policy measures.
A)Anti-spam software.
B)High security firewalls.
C)Software scanners.
D)Technological and policy measures.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
14
Which is NOT a likely symptom of a Trojan horse infection?
A)Browser home page changes.
B)CD-ROM and other devices seem to work on their own.
C)Clock time is incorrect.
D)Passwords,usernames,or accounts change.
A)Browser home page changes.
B)CD-ROM and other devices seem to work on their own.
C)Clock time is incorrect.
D)Passwords,usernames,or accounts change.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
15
What does adware do?
A)It creates popup advertising directly on the user's machine.
B)It downloads popup advertising within the Web browser.
C)It monitors user's activities to provide targeted advertising while surfing the Internet.
D)It prevents users from blocking online popups while browsing the Internet.
A)It creates popup advertising directly on the user's machine.
B)It downloads popup advertising within the Web browser.
C)It monitors user's activities to provide targeted advertising while surfing the Internet.
D)It prevents users from blocking online popups while browsing the Internet.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
16
Why should users be cautious of hidden file extensions?
A)The files are usually executable.
B)They often are used to hide Trojan horses.
C)The wrong application is likely to open.
D)They make it difficult to establish file-application associations.
A)The files are usually executable.
B)They often are used to hide Trojan horses.
C)The wrong application is likely to open.
D)They make it difficult to establish file-application associations.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
17
Which Trojan horse is a small,self-installing remote administration system that permits a user to control the infected system across a TCP\IP connection?
A)Back Orifice
B)Dropper
C)NetBus
D)Spybot
A)Back Orifice
B)Dropper
C)NetBus
D)Spybot
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
18
Which remote administration tool only operates on port 20034?
A)Back Orifice
B)NetBus
C)Portal of Doom
D)Spybot
A)Back Orifice
B)NetBus
C)Portal of Doom
D)Spybot
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
19
What did the util-linux Trojan horse do in 1999?
A)It captured log on information from infected computers to send to its creator.
B)It deleted essential operating system files from network computers.
C)It gained access to infected computers by deleting log on restrictions.
D)It prevented infected computers from accessing the Internet.
A)It captured log on information from infected computers to send to its creator.
B)It deleted essential operating system files from network computers.
C)It gained access to infected computers by deleting log on restrictions.
D)It prevented infected computers from accessing the Internet.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
20
Why should downloads of files be restricted to the IT department?
A)To centralize billing and payment for downloads.
B)To keep track of what is installed on network computers.
C)To permit the IT department access to employees' computers.
D)To prevent access to the organization's network by malicious software.
A)To centralize billing and payment for downloads.
B)To keep track of what is installed on network computers.
C)To permit the IT department access to employees' computers.
D)To prevent access to the organization's network by malicious software.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
21
____________ is an anti-spyware program that provides a free trial period and a system diagnostics utility.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
22
A system that has port 20034 blocked on all servers,workstations,and routers is not susceptible to the ____________ Trojan.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
23
Many believe that there are certain features in Microsoft products that seem to favor usability over ____________.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
24
____________ is probably the most widely known adware product.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
25
Applications designed to create pop-ups on the user's machine are called ____________.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck
26
A term for programs that attempt to collect information from a user's computer and make it available to another is ____________.
Unlock Deck
Unlock for access to all 26 flashcards in this deck.
Unlock Deck
k this deck