Evan chapter 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which type of malicious traffic is very hard to filter since it uses graphics to bypass text filters?

Image Spam

Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?

Oligomorphic malware

Which is the most effective way to remove a root kit?

Reformat the hard drive

What should you do to completely remove a rootkit from a computer?

Reformat the hard drive and reinstall the operating system.

____ is following an authorized person through a secure door.

Tailgating

A user who installs a program that prints out coupons but in the background silently collects her passwords has installed a _____.

Trojan

The two types of malware that require user intervention to spread are:

Viruses and trojans

_____ sends phishing messages only to wealthy individuals.

Whaling

Which statement regarding a keylogger is NOT true?

Which statement regarding a keylogger is NOT true?

Each of these is a reason why adware is scorned EXCEPT _____.

it displays the attacker's programming skills

What is it called when a user makes a typing error when entering a URL that takes him to an imposter website?

typo squatting

Which of the following is an attempt to influence a user by coercion?

intimidation

A watering hole attack is directed against _____.

users who access a common website

How can an attacker use a hoax?

A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings.

A student is able to modify their grades without detection. This could be accomplished through what means?

A keylogger

Which of the following is responsible for the majority of spam on the internet?

Botnets

What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?

Easter egg

The preferred method today of bot herders for command and control of zombies is _____.

Hypertext Transport Protocol (HTTP)

Why is a worm more concerning to a network administrator than other more common types of malware?

It doesn't require user intervention to spread

If your anti-virus has fully updated its definition files, which of the following is it least likely to detect?

Metamorphic malware

Which of these could NOT be defined as a logic bomb?

Send spam email to all users in the company on Tuesday.

What would be considered an example of pharming?

Your host file on your PC has been modified

Which of these items retrieved through dumpster diving would NOT provide useful information?

books

What is the term used for an attacker who controls multiple zombies in a botnet?

bot herder

Michelle pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Michelle performed?

impersonation

Which malware locks up a user's computer and then displays a message that purports to come from a law enforcement agency?

ransomware

What is unsolicited instant messaging called?

spim

Which of these is a general term used for describing software that gathers information without the user's consent?

spyware

Which of these is NOT an action that a virus can take?

transport itself through the network to another device

_____ requires a user to transport it from one computer to another.

virus


Conjuntos de estudio relacionados

Chapter 1 - Personal Finance Basics and the Time Value of Money

View Set

UPDATED ELECTRICITY (WITH JAMIE STUFF)

View Set

HWST 107 - Unit 5: Arts and Crafts

View Set

Managing Human Resources Chapter 8

View Set

Probiotics Bio Lab Presentation notes

View Set

Technical Writing Final Review Chapter 14

View Set