Filters
Question type

Study Flashcards

What is a worm?

Correct Answer

verifed

verified

A worm is a malicious program that uses ...

View Answer

A polymorphic virus changes its internal code to one of a set number of predefined mutations whenever it is executed.

Correct Answer

verifed

verified

Which of the following are considered to be the primary payload capabilities found in malware? (Choose all that apply. )


A) launch attacks
B) modify data
C) delete data
D) collect data

Correct Answer

verifed

verified

What specific type of phishing attack uses the telephone to target a victim?


A) target phishing
B) whaling
C) vishing
D) spear phishing

Correct Answer

verifed

verified

What specific science discipline do most social engineering attacks rely on when they are being used?


A) psychiatry
B) criminology
C) psychology
D) engineering

Correct Answer

verifed

verified

What is malware?

Correct Answer

verifed

verified

Malware is software that enters a comput...

View Answer

What type of malicious software technology is used to download and install software without the user's interaction?


A) automatic download software
B) automated software
C) system modifying software
D) tracking software

Correct Answer

verifed

verified

Malware is software that enters a computer system with the user's knowledge or consent and then performs an unwanted and harmful action.

Correct Answer

verifed

verified

A rootkit can hide its presence,but not the presence of other malware.

Correct Answer

verifed

verified

What are some of the functions performed by viruses?

Correct Answer

verifed

verified

Viruses can corrupt or delete ...

View Answer

What type of system security malware allows for access to a computer,program,or service without authorization?


A) botnet
B) zombie
C) backdoor
D) command and control

Correct Answer

verifed

verified

Vishing is a false warning,often contained in an email message claiming to come from the IT department.

Correct Answer

verifed

verified

Which of the following is malicious computer code that reproduces itself on the same computer?


A) virus
B) worm
C) adware
D) spyware

Correct Answer

verifed

verified

A remote access Trojan has the basic functionality of a Trojan but also gives the threat actor unauthorized remote access to the victim's computer by using specially configured communication protocols.

Correct Answer

verifed

verified

A virus self-replicates on the host computer and spreads to other computers by itself.

Correct Answer

verifed

verified

What social engineering principal convinces a victim an immediate action is needed?


A) authority
B) urgency
C) intimidation
D) scarcity

Correct Answer

verifed

verified

What type of malware is heavily dependent on a user in order to spread?


A) Trojan
B) worm
C) rootkit
D) virus

Correct Answer

verifed

verified

What type of computer code is typically added to a legitimate program but lies dormant until a specific logical event triggers it?


A) script
B) logic bomb
C) macro virus
D) metamorphic virus

Correct Answer

verifed

verified

Which of the following is not one of the four methods for classifying the various instances of malware by using the primary trait that the malware possesses?


A) Circulation
B) Infection
C) Concealment
D) Source

Correct Answer

verifed

verified

A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:


A) A rootkit
B) A macro
C) A program
D) A process

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer