Malware in the current day has been adopted by criminals for a wide array of purposes to capture
information about the victim or commit other acts. correct answers True
In some cases, spyware creators have stated their intentions outright by presenting End-User
License Agreements (EULAs) to the victim. correct answers True
Malware can be used to turn a system into a server hosting any type of content, such as illegal
music or movies, pirated software, pornography, and financial data. correct answers True
The first viruses debuted in the "wild" in the 1990s as ways to destroy exam records at
universities. correct answers False
Hoax viruses are those designed to make the user take action even though no infection or threat
exists. correct answers True
Logic bombs are relatively easy to detect. correct answers False
Modern antivirus software is not equipped to deal with the problems polymorphic viruses pose.
correct answers False
If any part of a multipartite virus is not eradicated from the infected system, it can re-infect the
system. correct answers True
Antivirus software cannot detect suspicious behavior of applications on a system. correct
answers False
Worms require user intervention for their infection to take place; viruses do not. correct answers
False
,One of the main characteristics of worms is that they do not need a host program to function.
correct answers True
Education is the first line of defense for stopping both worms and viruses. correct answers True
Of the tools for detecting Trojans, one of the easiest to access would be the command line tool
known as netstat. correct answers True
Wrappers can be used to merge an attacker's intended payload with a harmless executable to
create a single executable from the two. correct answers True
Many attackers gain access to their target system through something known as a window. correct
answers False
Covert channels are not capable of transferring information using a mechanism that was not
designed for the purpose. correct answers False
Hardware-based keystroke loggers can be plugged into a universal serial bus (USB) or PS2 port
on a system and monitor the passing signals for keystrokes. correct answers True
Delivering malicious software via instant messaging (IM) is relatively difficult because IM
software has had strong security controls from the beginning. correct answers False
Scareware is software specifically designed to display advertisements on a system in the form of
pop-ups or nag screens. correct answers False
Adware is a type of malware designed to trick victims into purchasing and downloading useless
and potentially dangerous software. correct answers False
, Which of the following terms refers to any software that is inherently hostile, intrusive, or
annoying in its operation? correct answers Malware
Which of the following laws was originally passed to address federal computer-related offenses
and the cracking of computer systems? correct answers The Computer Fraud and Abuse Act of
1986
Which of the following is NOT a type of malware? correct answers Gameware
Which of the following types of malware is a piece of code or software that spreads from system
to system by attaching itself to other files and is activated when the file is accessed? correct
answers Virus
The part of a hard drive or removable media that is used to boot programs is called the: correct
answers boot sector.
Which of the following types of viruses is designed to change its code and "shape" to avoid
detection by virus scanners, which would look for a specific virus code and not the new version?
correct answers Polymorphic virus
Which of the following types of viruses is a piece of code or software designed to lie in wait on a
system until a specified event occurs? correct answers Logic bomb
Which of the following types of viruses infects using multiple attack vectors, including the boot
sector and executable files on the hard drive? correct answers Multipartite virus
Which of the following types of viruses infects and operates through the use of a programming
language built into applications such as Microsoft Office in the form of Visual Basic for
Applications (VBA)? correct answers Macro virus