Security+ Malware
A computer program containing malicious segment that attaches itself to an application program or other executable component is called:
Virus
A standalone malicious computer program that replicates itself over a computer network is known as:
Worm
A computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an online hijacker is called:
Zombie
Which type of files pose the greatest risk related to the distribution of malware?
.exe
Which of the following tags allows loading malicious code (often in the form of JavaScript applet) onto an otherwise trusted page?
<iframe>
Which of the following answers refer to the characteristic features of an advertising-supported software? (Select 2 answers)
Advertisements embedded in a computer application, Commonly referred to as adware
A software that automatically plays, displays, or downloads advertisements to a computer is known as:
Adware
Which of the application types listed below fall(s) into the category of anti-malware solutions? (Select all that apply)
Anti-spyware, Anti-virus, Anti-spam
A type of virus that takes advantage of various mechanisms specifically designed to make tracing, disassembling and reverse engineering its code more difficult is known as:
Armored virus
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service or an entire computer system?
Backdoor
A malware-infected networked host under remote control of a hacker is commonly referred to as:
Bot
A collection of zombies is known as:
Botnet
A group of computers running malicious software under control of a hacker is known as:
Botnet
Which of the following components pose a risk of unintended downloading and execution of malware on a PC? (Select 2 answers)
Browser plugins, ActiveX controls
Which of the following answers refers to a technique used by certain types of malware to cause an error in a program and make it easier to run malicious code?
Buffer overflow
Which of the following terms refers to a computer security vulnerability allowing attackers to insert malicious code into a trusted website?
Cross-site scripting
A type of rogue application that exploits dialup connections by making unauthorized telephone calls is known as:
Dialer
A type of Trojan designed to transfer other malware onto a PC via Internet connection is known as:
Downloader
A type of Trojan designed to install other malware files onto a PC without the need for an active Internet connection is known as:
Dropper
An antivirus software can be kept up to date through: (Select all that apply)
Engine updates, Virus signature updates
Computer code or command that takes advantage of a design flaw in software is commonly referred to as:
Exploit
An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of:
False positive error
Which of the following terms refers to unwanted applications or files that are not classified as malware, but can worsen the performance of computers and pose security risk?
Grayware
Which of the following terms describes a method employed by many computer antivirus programs designed to detect previously unknown types of malware?
Heuristics
Which of the following answers lists an example of spyware?
Keylogger
Malicious code activated by a specific event is known as:
Logic bomb
Which type of computer virus takes advantage of the capability for creating and embedding simple scripts in popular office applications?
Macro virus
Which of the following answers refers to a mobile software that while running in disguise of a legitimate program tries to harm user devices or personal data?
Malicious app
Harmful programs used to disrupt computer operation, gather sensitive information, or gain access to private computer systems are commonly referred to as: (Select best answer)
Malware
Which security measure is in place when a client is denied access to the network due to outdated antivirus software?
NAC
In computer security, the part of malware code responsible for performing malicious action is referred to as:
Payload
Which of the computer virus types listed below deletes or corrupts contents of the target host file instead of attaching itself to the file?
Phage virus
The process by which malicious software changes its underlying code in order to avoid detection is known as:
Polymorphism
Which of the following answers refer to the ways of delivering online advertising content utilized by adware? (Select 2 answers)
Pop-up, pop-under
What is the function of Windows Defender software?
Protection against viruses, spyware and other potentially unwanted software
The process of isolation of files and applications suspected of containing malware in order to prevent further execution and potential harm to the user's system is known as:
Quarantine
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:
Randsomware
Which of the following answers refers to the process by which a computer virus makes copies of itself to carry out subsequent infections?
Replication
A computer virus that actively attacks an antivirus program in an effort to prevent detection is called:
Retrovirus
Which of the following answers refers to an anti-antivirus exploit?
Retrovirus
A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Rootkit
Entry fields of web forms lacking input validation are vulnerable to what kind of attacks?
SQL injection
Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malicious code are known as:
Signature files
Malicious software collecting information about users without their knowledge/consent is known as:
Spyware
Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is known as:
Trojan Hors
In computer security, an automatic download performed without the user's consent (and often without any notice) aimed at installing malware or potentially unwanted programs is known as a drive-by download.
True
In its more intrusive form, adware can track browsing habits in order to serve better targeted ads based on user interests.
True
The term "companion virus" refers to an older type of computer virus which doesn't alter files and works by creating infected companion file with the exact same name as the legitimate program, but with different file extension. The virus takes advantage of the fact that in the old MS-DOS command-line interface executables can be run by providing only the file name which facilitates the execution of infected code by an unaware user.
True
Web browser extensions (a.k.a. plugins, or add-ons) are downloadable components that extend the browser's functionality by enabling interactive features of web pages. Downloading and installing browser extensions can be risky, because some of them may contain malicious code and in disguise of a legitimate program introduce malware to the system.
True
Which of the following acronyms refers to a network security solution combining the functionality of a firewall with additional safeguards such as URL filtering, content inspection, or malware inspection?
UTM