Security Awareness - Ch3 Unit 3 Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which level of UAC provides the lowest level of security? Notify on demand Never notify Universal notify Always notify

Never notify

Malware payload allows an attacker to execute virtually any command on the victim's computer this is called _____. remote configuration extension reach code arbitrary code execution master control

arbitrary code execution

Which of the following is not a type of malware that has as its primary trait circulation and/or infection? virus worm botnet Trojan

botnet

Which of these could NOT be defined as a logic bomb? Reformat the hard drive three months after Susan Jones left the company. Send spam email to all users in the company. Erase all data if John Smith's name is removed from the list of employees. If the company's stock price drops below $10, then credit Jeff Brown with 10 additional years of retirement credit.

Send spam email to all users in the company.

Which statement regarding a keylogger is NOT true? Software keyloggers are easy to detect. Keyloggers can be used to capture passwords, credit card numbers, or personal information. Hardware keyloggers are installed between the keyboard connector and computer keyboard USB port. Software keyloggers can be designed to send captured information automatically back to the attacker through the Internet.

Software keyloggers are easy to detect.

A user who installs a program that prints out coupons but in the background silently collects her passwords has installed a _____. virus worm logic bomb Trojan

Trojan

Each of the following is a question that the user should ask regarding data backups except _____. Where should the backup be stored? Who should do the backup? How frequently should be backup be performed? What content should be backed up?

Who should do the backup?

What is access a computer, program, or service that circumvents any normal security protections called? backdoor hole honey pit trapdoor

backdoor

Each of the following is a typical feature of a fee-based Internet backup service except____________. delayed deletion file feedback information backup to an external hard drive universal access

backup to an external hard drive

Which of the following enhancements to software provides new or expanded functionality but does not address security vulnerabilities? patch service pack feature update resource package

feature update

Each of the following is the reason why adware is scorned, except _______. it displays objectionable content it displays the attackers programming skills it can interfere with a user's productivity it can cause a computer to crash or slow down

it displays the attackers programming skills

Which malware locks up a user's computer and then displays a message that purports to come from a law enforcement agency? worm Trojan ransomware virus

ransomware

A _____ is a downloadable image that can be used to scan a computer for malware. system repair disc rescue disc clean disc resource disc

rescue disc

The database that contains the sequence of characters of a virus is called the _____. string file signature file malware DB virus resource file

signature file

Which of these is a general term used for describing software that gathers information without the user's consent? adware pullware scrapeware spyware

spyware

Which of these is NOT an action that a virus can take? reformat the hard disk drive cause a computer to crash transport itself through the network to another device erase files from a hard drive

transport itself through the network to another device

How many carriers must a virus have to replicate and attack? one two three four

two

A(n) _____ requires a user to transport it from one computer to another. virus worm rootkit adware

virus

Botnets are composed of _____. herders zombies spam Internet Relay Chat (IRC) instruments

zombies


संबंधित स्टडी सेट्स

Anatomy of the Female Pelvis CH 16

View Set

Chapter 2 & 3: Project Conception & Delivery

View Set

Chapter 18: Drug Therapy with Beta-Lactam Antibacterial Agents

View Set

CCMP, SAE, TKIP, WPA, WPA2, WPA3, TACACS+, Kerberos, RADIUS, Diameter, AES, WEP

View Set

Chapter 10: Agency, Ethics, and the Law

View Set