Security+ Chapter 6 Practice Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

(1) What is the difference between a worm and a virus? A worm is self-replicating but a virus isn't self-replicating A virus is self-replicating but a worm isn't self-replicating A virus runs in a response to an event such as a date, but a worm runs on its own schedule A worm runs in response to an event such as a date, but a virus runs on its own schedule

A worm is self-replicating but a virus isn't self-replicating

(10) What can reduce unwanted email that contains advertisements? Anti-spam software Antivirus software File integrity checkers Botnet software

Anti-spam software

(13) What type of signature-based monitoring can detect and remove known worms and Trojans? Anti-spyware NIDS NIPS Antivirus

Antivirus

(14) A user's computer has recently been slower than normal and has been sending out email without user interaction. Of the following choices, what is the best choice to resolve this issue? Botnet software Anti-spam software Anti-spyware software Antivirus software

Antivirus software

(4) At 9AM on January 31, an administrator starts receiving alerts from monitoring systems indicating problems with servers in the datacenter. He discovers that all servers are unreachable. Of the following choices, what is the most likely cause? Logic bomb XSRF attack Buffer overflow Rootkit

Logic bomb

(5) An employee has added malicious code into the company's personnel system. The code verifies the employment status of the employee once a month. If the check shows the pesron is no longer an active employee, it launches attacks on internal servers. What type of code is this? Botnet Logic bomb Trojan Adware

Logic bomb

(11) A user's system has spyware installed. What is the most likely result? Loss of root level access Loss of confidentiality Loss of integrity Loss of anonymity on the internet

Loss of confidentiality

(20) An organization regularly shreds paper instead of throwing it away. What are they trying to prevent? Losses due to dumpster diving Losses due to data classification Losses due to data classification Losses due to P2P

Losses due to dumpster diving

(16) An attacker wants to obtain bank account information from a user. Which of the following methods do attackers use? Tailgating Fuzzing Password masking Phishing

Phishing

(12) Additional windows are appearing when a user surfs the internet. These aren't malicious, but the user wants them to stop. What can stop this behavior? Antivirus software Host-based firewall Pop-up blocker Input validation

Pop-up blocker

(7) Where would a security specialist look for a hooked process? Rootkit Disk RAM Firewall log

RAM

(6) A process running on a system has system level access to the operating system kernel. Investigation shows that it has modified system files. What best describes this behavior? Rootkit Worm Cross-site scripting Adware

Rootkit

(8) A file integrity checker on a database server detected several modified system files. What could cause this? Spam Buffer overflow Logic bomb Rootkit

Rootkit

(21) A personal is trying to gain unauthorized information through casual observation. What type of attack is this? Tailgating Whaling Dumpster Diving Shoulder Surfing

Shoulder Surfing

(22) A web application developer is suggesting using password masking in the application. What is the developer trying to prevent? Buffer overflow attacks Shoulder surfing SQL injection Cross-site scripting

Shoulder surfing

(15) While surfing the internet, a user sees a message indicating a malware infection and offering free antivirus software. The user downloads the free antivirus but realizes it infected this system. What of the following choices best explains what happened to the user? Social engineering Trojan Vishing Spim

Social engineering

(9) What can you use to block unsolicited email? Spam filter Rootkit Spyware Antivirus software

Spam filter

(17) Of the following choices, what best represents an attack against specific employees of a company? Phishing Vishing Spim Spear phishing

Spear phishing

(2) After downloading pirated software, a user notices the computer is running very slowly and antivirus software is detecting malware. What likely happened? The user installed a Trojan The user installed a worm The user installed a logic bomb The user installed a botnet

The user installed a Trojan

(3) What type of malware do users inadvertently install with USB thumb drives? Spam Trojans Buffer overflow Logic bomb

Trojans

(19) Bob reported receiving a message from his bank prompting him to call back about a credit card. When he called back, an automated recording prompted him to provide personal information to verify his identity and then provide details about his bank and credit card accounts. What type of attack is this? Phishing Whaling Vishing VolP

Vishing

(18) Attackers sent a targeted email attack to the president of a company. What best describes this attack? Phishing Spam Whaling Botnet

Whaling


Ensembles d'études connexes

The Eukaryotic Cell Biology Pre-Class Assingment

View Set

Economics Today The Macro View Ch. 8 - Measuring the Economy's Performance (Homework, Terms & Quiz)

View Set

Microbiology Final - Lesson Objectives

View Set

Movement across the cell membrane

View Set

1.3 The OSI model and TCP/IP model layers

View Set

PRE-AP WOLRD LITERATURE II FINAL REVIEW

View Set

Unit 2: Civil Liberties and Civil Rights FRQs Quizlet

View Set