CpS-391: Module 3-4 (A+ Graded)
What does ransomware do to an endpoint device? correct answers Ransomware attacks the endpoint device holding it hostage by preventing it from functioning unless the user fulfills the ransom payment demanded. The files in James's computer were found spreading within the device without any human action. As an engineer, you were requested to identify the problem and help James resolve it. During file code inspection, you noticed that certain types of files in the computer have similar codes. You found that the problem is coming from a set of codes that are not part of the actual files, appended at the bottom of the file. You also noticed a transfer control code written at the beginning of the files giving control to the code at the bottom of the file. Which type of infection is this a characteristic of? correct answers This is a typical characteristic of an endpoint device infected with a file-based virus attack. Juan, a cybersecurity expert, has been hired by an organization whose networks have been compromised by a malware attack. After analyzing the network systems, Juan submits a report to the company mentioning that the devices are infected with malware that uses a split infection technique on files. Which malware attack is Juan reporting? correct answers Virus Which of the following is a feature of a fileless virus? correct answers Fileless viruses are persistent. Japan's cybercrime control center noticed that around 200,000 Tokyo computers are infected by bots, and all these bots are remotely controlled by a single attacker. What is this attacker referred to as? correct answers Bot herder Which of the following statements correctly describes the disadvantage of a hardware-based keylogger? correct answers A hardware-based keylogger must be physically installed and removed without detection. Kate decides to download an extension to her favorite browser to quickly store links on her spreadsheet software. While downloading the software, she ignores the opt-out check box that allows the extension to download a search toolbar. What has occurred here? correct answers Kate has installed a potentially unwanted program (PUP). Shanise is an IT security professional for a large private bank. She got an alert that the bank website received a funds transfer request that was correctly credentialed but flagged as being out of the account owner's usual pattern. If the alert is correct, what type of attack has likely occurred? correct answers CSRF attack
Written for
- Institution
- CpS-391
- Course
- CpS-391
Document information
- Uploaded on
- January 19, 2023
- Number of pages
- 8
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
what does ransomware do to an endpoint device
Also available in package deal