Ch. 3 Review

¡Supera tus tareas y exámenes ahora con Quizwiz!

Malware payload allows an attacker to execute virtually any command on the victim's computer this is called _____. a. arbitrary code execution b. remote configuration c. master control d. extension reach code

A. ARBITRARY CODE EXECUTION

Each of the following is a typical feature of a fee-based Internet backup service except ________. a. backup to an external hard drive b. universal access c. file feedback information d. delayed detection

A. BACKUP TO AN EXTERNAL HARD DRIVE

Each of the following is the reason why adware is scorned, except ____. a. it displays the attackers programming skills b. it can interfere with a user's productivity c. it displays objectionable content d. it can cause a computer to crash or slow down

A. DISPLAYS THE ATTACKERS PROGRAMMING SKILLS

Which of the following enhancements to software provides new or expanded functionality but does not address security vulnerabilities? a. feature update b. patch c. service pack d. resource package

A. FEATURE UPDATE

Which statement regarding a keylogger is not true? a. software keyloggers are easy to detect b. keyloggers can be used to capture passwords, cc numbers, or personal info c. hardware keyloggers are installed between the keyboard connector and the company keyboard usb port d. software keyloggers can be designed to send captured information automatically back to the attacker through the internet.

A. SOFTWARE KEYLOGGERS ARE EASY TO DETECT

Which of these is NOT an action that a virus can take? a. transport itself through the network to another device b. reformat the hard disk drive c. cause a computer to crash d. erase files from the hard drive

A. TRANSPORT ITSELF THROUGH THE NETWORK TO ANOTHER DEVICE

What is access a computer, program, or service that circumvents any normal security protections called? a. hole b. backdoor c. trapdoor d. honey pit

B. BACKDOOR

Which malware locks up a user's computer and then displays a message that purports to come from a law enforcement agency? a. virus b. ransomware c. worm d. Trojan

B. RANSOMWARE

A ______ is a downloadable image that can be used to scan a computer for malware a. system repair disc b. rescue disc c. resource disc d. clean disc

B. RESCUE DISC

How many carriers must a virus have to replicate and attack? a. 1 b. 2 c. 3 d. 4

B. TWO 2

Each of the following is a question that the user should ask regarding data backups except a. What content should be backed up? b. Who should do the backup c. Where should the backup be stored? d. How frequently should the backup be performed?

B. WHO SHOULD DO THE BACKUP

Botnets are composed of a. Internet relay chat (IRC) instruments b. zombies c. herders d. spam

B. ZOMBIES

Which type of firewall is an external hardware device? a. personal firewall b. remote firewall c. network firewall d. application resource firewall

C. NETWORK FIREWALL

Which of these could NOT be defined as a logic bomb? a. erase all data if John Smith's name is removed from the list of employees b. reformat the hard drive 3 months after Susan Jones left the company. c. send spam email to all users in the company d. If the company's stock price drops below $10 then credit Jeff Brown with 10 additional years of retirement credit.

C. SEND SPAM EMAIL TO ALL USERS IN THE COMPANY

Which of these is a general term used for describing software that gathers information without the user's consent? a. pullware b. adware c. spyware d. scrapeware

C. SPYWARE

A user who installs a program that prints out coupons but in the background silently collects her passwords has installed a _____. a. virus b. worm c. Trojan d. logic bomb

C. TROJAN

Which of the following is NOT a type of malware that has as its primary trait circulations and/or infection? a. Trojan b. virus c. worm d. botnet

D. BOTNET

The database that contains the sequence of characters of a virus is called the ___________. a. string file b. malware DB c. virus resource file d. signature file

D. SIGNATURE FILE

A(n) ________ requires a user to transport it from one computer to another. a. adware b. worm c. rootkit d. virus

D. VIRUS

Which level of UAC provides the lowest level of security? a. universal notify b. always notify c. never notify d. notify on demand

NEVER NOTIFY


Conjuntos de estudio relacionados

HIST 1010/1013 Final/Test 3/Exam 3 Ultimate Study Set Auburn

View Set

Google Doc Chapter 11 HTH 354 and in class review/quizzes

View Set

Finance - Fist Quiz - Multiple choice, written response, true and false

View Set