Filters
Question type

Study Flashcards

The ideal solution to the threat of malware is __________.


A) identification
B) removal
C) detection
D) prevention

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

Malicious software aims to trick users into revealing sensitive personal data.

A) True
B) False

Correct Answer

verifed

verified

Sometimes known as a "logic bomb", the __________ is the event or condition that determines when the payload is activated or delivered.

Correct Answer

verifed

verified

A __________ virus is explicitly designed to hide itself from detection by anti-virus software.

Correct Answer

verifed

verified

In addition to propagating, a worm usually carries some form of payload.

A) True
B) False

Correct Answer

verifed

verified

A logic bomb is the event or condition that determines when the payload isactivated or delivered.

A) True
B) False

Correct Answer

verifed

verified

A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is __________.


A) Adobe
B) Animoto
C) malware
D) Prezi

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met.


A) logic bomb
B) trapdoor
C) worm
D) Trojan horse

E) All of the above
F) B) and C)

Correct Answer

verifed

verified

Two types of perimeter monitoring software are _________ monitoring and egress monitoring.

Correct Answer

verifed

verified

Keyware captures keystrokes on a compromised system.

A) True
B) False

Correct Answer

verifed

verified

A virus that attaches to an executable program can do anything that theprogram is permitted to do.

A) True
B) False

Correct Answer

verifed

verified

A __________ uses macro or scripting code, typically embedded in a document and triggered when the document is viewed or edited, to run and replicate itself into other such documents.


A) boot sector infector
B) file infector
C) macro virus
D) multipartite virus

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A Trojan horse is an apparently useful program containing hidden code that,when invoked, performs some harmful function.

A) True
B) False

Correct Answer

verifed

verified

Countermeasures for malware are generally known as _________ mechanisms because they were first developed to specifically target virus infections.

Correct Answer

verifed

verified

Unsolicited bulk e-mail is referred to as __________.


A) spam
B) propagating
C) phishing
D) crimeware

E) A) and B)
F) A) and D)

Correct Answer

verifed

verified

A __________ is a collection of bots capable of acting in a coordinated manner.

Correct Answer

verifed

verified

Computer viruses first appeared in the early __________.


A) 1960s
B) 1970s
C) 1980s
D) 1990s

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Many forms of infection can be blocked by denying normal users the right tomodify programs on the system.

A) True
B) False

Correct Answer

verifed

verified

__________ is malware that encrypts the user's data and demands payment in order to access the key needed to recover the information.


A) Trojan horse
B) Ransomware
C) Crimeware
D) Polymorphic

E) A) and D)
F) All of the above

Correct Answer

verifed

verified

E-mail is a common method for spreading macro viruses.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 45

Related Exams

Show Answer