Security+ Chapter 2 Quiz

Ace your homework & exams now with Quizwiz!

What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?

*Adware* Keylogger Spam Trojan

Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?

*Oligomorphic malware* Polymorphic malware Metamorphic malware Statimorphic malware

Software keyloggers are programs that silently capture all keystrokes, including passwords and sensitive information.

*True* or False

A macro is a series of instructions that can be grouped together as a single command.

*True* or False?

Because of how a rootkit replaces operating system files, it can be difficult to remove a rootkit from a system.

*True* or False?

The two types of malware that require user intervention to spread are:

*Viruses and Trojans* Rootkits and worms Trojans and worms Rootkits and Trojans

What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?

*rootkit* backdoor wrapper shield

Which of the following is malicious computer code that reproduces itself on the same computer?

*virus* worm adware spyware

How many different Microsoft Windows file types can be infected with a virus?

50 60 *70* 80

What type of system security malware allows for access to a computer, program, or service without authorization?

Botnet Zombie *Backdoor* Command and Control

Which of the following is not one of the four methods for classifying the various types of malware?

Circulation Infection Concealment *Source*

The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?

Dumpster diving *Tailgating* Stalking Shadowing

Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:

Lockware *Ransomware* Stealware Hostageware

What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?

Phreaking Hacking *Social engineering* Reverse engineering

What is the term used to describe unsolicited messages received on instant messaging software?

Spam *Spim* Splat Crust

What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?

Spam Adware *Watering Hole* Typo Squatting

Computer code that is typically added to a legitimate program, but lies dormant until it is triggered by a specific logical event is known as a?

Trojan *logic bomb* macro virus metamorphic virus

What type of malware is heavily dependent on a user in order to spread?

Trojan worm rootkit *virus*

What type of undocumented, yet benign, hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?

Trojan horse virus bug *Easter egg*

Spreading similarly to a virus, a worm inserts malicious code into a program or data file.

True or *False*?

Successful attacks on computers today consist of a single element, malicious software programs that are created to infiltrate computers with the intent to do harm.

True or *False*?

A series of instructions that can be grouped together as a single command, and are often used to automate a complex set of tasks or a repeated series of tasks are known as:

a rootkit *a macro* a program a process

A virus that infects an executable program file is known as?

macro virus *program virus* companion virus boot sector virus

Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious:

script virus *Trojan* worm

One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect. In addition, it separates virus code into different pieces, and injects these pieces throughout the infected program code. What is the name for this technique?

stealth appender *Swiss cheese* split


Related study sets

chapter 6 psychology study guide

View Set

Leveraging IS in Business Midterm

View Set

OM 300 Module 14: Lean Operations

View Set

ATI TEAS science (S.1.1 General Anatomy & Physiology of a human), ATI TEAS 6 Review, ATI TEAS 6 - English & Language, TEAS 6 SCIENCE (IN-DEPTH BEYOND STUDY GUIDES), ATI TEAS 6 - Science (Human Anatomy and Physiology)

View Set

Intro to solid earth lecture: final exam

View Set