C845 Information Systems Security: Chapter 7
Questions with Correct Answers | Updated
(100% Correct Answers)
Propagation Mechanism Answer: the way that a malware object
spreads
Payload Answer: the malicious action that the malware performs
Viruses Answer: spread by human action
Worms Answer: spread by themselves
Trojan Horses Answer: disguise themselves as beneficial programs,
act as advertised when they are run, deliver malicious payload
behind the scenes
Remote Access Trojan (RAT) Answer: provide backdoors to hacked
systems
Adware Answer: displays advertisements
Spyware Answer: gathers information by logging keystrokes,
monitoring web browsing, and searching hard drives and cloud
storage
PUPs Answer: Potentially Unwanted Programs
© 2025 All rights reserved
, 2
Ransomware Answer: blocks a user's legitimate use of a computer
until a ransom is paid
Crypto Malware Answer: mines cryptocurrency
Scareware Answer: designed to look like a legitimate security
warning but is simply a scam
Backdoors Answer: provide workaround access
Logic Bombs Answer: malware that's set to execute a payload when
certain conditions are met
Root Account Answer: a special superuser account that provides
unrestricted access to system resources
Rootkits Answer: escalate user privileges
Fileless Viruses Answer: a form of malware that seeks to avoid
detection by never writing any data to a disk, only to the
computer's memory
Botnet Answer: a network of infected machines that steal
computing power, network bandwidth, and storage capacity
Code Signing Answer: applies digital signatures to software,
providing users with confidence that software comes from a trusted
source
© 2025 All rights reserved