Security+ Malware

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A computer program containing malicious segment that attaches itself to an application program or other executable component is called:

Virus

A standalone malicious computer program that replicates itself over a computer network is known as:

Worm

A computer that has been compromised by a virus or Trojan horse that puts it under the remote control of an online hijacker is called:

Zombie

Which type of files pose the greatest risk related to the distribution of malware?

.exe

Which of the following tags allows loading malicious code (often in the form of JavaScript applet) onto an otherwise trusted page?

<iframe>

Which of the following answers refer to the characteristic features of an advertising-supported software? (Select 2 answers)

Advertisements embedded in a computer application, Commonly referred to as adware

A software that automatically plays, displays, or downloads advertisements to a computer is known as:

Adware

Which of the application types listed below fall(s) into the category of anti-malware solutions? (Select all that apply)

Anti-spyware, Anti-virus, Anti-spam

A type of virus that takes advantage of various mechanisms specifically designed to make tracing, disassembling and reverse engineering its code more difficult is known as:

Armored virus

Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service or an entire computer system?

Backdoor

A malware-infected networked host under remote control of a hacker is commonly referred to as:

Bot

A collection of zombies is known as:

Botnet

A group of computers running malicious software under control of a hacker is known as:

Botnet

Which of the following components pose a risk of unintended downloading and execution of malware on a PC? (Select 2 answers)

Browser plugins, ActiveX controls

Which of the following answers refers to a technique used by certain types of malware to cause an error in a program and make it easier to run malicious code?

Buffer overflow

Which of the following terms refers to a computer security vulnerability allowing attackers to insert malicious code into a trusted website?

Cross-site scripting

A type of rogue application that exploits dialup connections by making unauthorized telephone calls is known as:

Dialer

A type of Trojan designed to transfer other malware onto a PC via Internet connection is known as:

Downloader

A type of Trojan designed to install other malware files onto a PC without the need for an active Internet connection is known as:

Dropper

An antivirus software can be kept up to date through: (Select all that apply)

Engine updates, Virus signature updates

Computer code or command that takes advantage of a design flaw in software is commonly referred to as:

Exploit

An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an example of:

False positive error

Which of the following terms refers to unwanted applications or files that are not classified as malware, but can worsen the performance of computers and pose security risk?

Grayware

Which of the following terms describes a method employed by many computer antivirus programs designed to detect previously unknown types of malware?

Heuristics

Which of the following answers lists an example of spyware?

Keylogger

Malicious code activated by a specific event is known as:

Logic bomb

Which type of computer virus takes advantage of the capability for creating and embedding simple scripts in popular office applications?

Macro virus

Which of the following answers refers to a mobile software that while running in disguise of a legitimate program tries to harm user devices or personal data?

Malicious app

Harmful programs used to disrupt computer operation, gather sensitive information, or gain access to private computer systems are commonly referred to as: (Select best answer)

Malware

Which security measure is in place when a client is denied access to the network due to outdated antivirus software?

NAC

In computer security, the part of malware code responsible for performing malicious action is referred to as:

Payload

Which of the computer virus types listed below deletes or corrupts contents of the target host file instead of attaching itself to the file?

Phage virus

The process by which malicious software changes its underlying code in order to avoid detection is known as:

Polymorphism

Which of the following answers refer to the ways of delivering online advertising content utilized by adware? (Select 2 answers)

Pop-up, pop-under

What is the function of Windows Defender software?

Protection against viruses, spyware and other potentially unwanted software

The process of isolation of files and applications suspected of containing malware in order to prevent further execution and potential harm to the user's system is known as:

Quarantine

Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:

Randsomware

Which of the following answers refers to the process by which a computer virus makes copies of itself to carry out subsequent infections?

Replication

A computer virus that actively attacks an antivirus program in an effort to prevent detection is called:

Retrovirus

Which of the following answers refers to an anti-antivirus exploit?

Retrovirus

A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-level access to a computer or computer network is known as:

Rootkit

Entry fields of web forms lacking input validation are vulnerable to what kind of attacks?

SQL injection

Data files containing detection and/or remediation code that antivirus or antispyware products use to identify malicious code are known as:

Signature files

Malicious software collecting information about users without their knowledge/consent is known as:

Spyware

Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful program is known as:

Trojan Hors

In computer security, an automatic download performed without the user's consent (and often without any notice) aimed at installing malware or potentially unwanted programs is known as a drive-by download.

True

In its more intrusive form, adware can track browsing habits in order to serve better targeted ads based on user interests.

True

The term "companion virus" refers to an older type of computer virus which doesn't alter files and works by creating infected companion file with the exact same name as the legitimate program, but with different file extension. The virus takes advantage of the fact that in the old MS-DOS command-line interface executables can be run by providing only the file name which facilitates the execution of infected code by an unaware user.

True

Web browser extensions (a.k.a. plugins, or add-ons) are downloadable components that extend the browser's functionality by enabling interactive features of web pages. Downloading and installing browser extensions can be risky, because some of them may contain malicious code and in disguise of a legitimate program introduce malware to the system.

True

Which of the following acronyms refers to a network security solution combining the functionality of a firewall with additional safeguards such as URL filtering, content inspection, or malware inspection?

UTM


Ensembles d'études connexes

RNSG 1533 Exam 3 - Acid base & Metabolism

View Set

therapeutics exam 2 practice q's--wound care

View Set

Human physiology Exam 1,3, and Final test bank

View Set