100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Network Security Quiz 7 Malware Exam 30 Questions with Verified Answers,100% CORRECT

Rating
-
Sold
-
Pages
4
Uploaded on
23-03-2024
Written in
2023/2024

Network Security Quiz 7 Malware Exam 30 Questions with Verified Answers Malicious software aims to trick users into revealing sensitive personal data. - CORRECT ANSWER True Keyware captures keystrokes on a compromised system. - CORRECT ANSWER False Metamorphic code is software that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics. - CORRECT ANSWER False A virus that attaches to an executable program can do anything that the program is permitted to do. - CORRECT ANSWER True It is not possible to spread a virus via a USB stick. - CORRECT ANSWER False A logic bomb is the event or condition that determines when the payload is activated or delivered. - CORRECT ANSWER True Many forms of infection can be blocked by denying normal users the right to modify programs on the system. - CORRECT ANSWER True A macro virus infects executable portions of code. - CORRECT ANSWER False E-mail is a common method for spreading macro viruses. - CORRECT ANSWER True In addition to propagating, a worm usually carries some form of payload. - CORRECT ANSWER True A Trojan horse is an apparently useful program containing hidden code that, when invoked, performs some harmful function. - CORRECT ANSWER True Packet sniffers are mostly used to retrieve sensitive information like usernames and passwords. - CORRECT ANSWER True A bot propagates itself and activates itself, whereas a worm is initially controlled from some central facility. - CORRECT ANSWER False Every bot has a distinct IP address. - CORRECT ANSWER True Programmers use backdoors to debug and test programs. - CORRECT ANSWER True A program that is covertly inserted into a system with the intent of compromising the integrity or confidentiality of the victim's data is __________. A. Adobe B. Animoto C. Malware D. Prezi - CORRECT ANSWER C. Malware __________ are used to send large volumes of unwanted e-mail. A. Rootkits B. Spammer programs C. Downloaders D. Auto-rooters - CORRECT ANSWER B. Spammer programs A __________ is code inserted into malware that lies dormant until a predefined condition, which triggers an unauthorized act, is met. A. logic bomb B. trapdoor C. worm D. Trojan horse - CORRECT ANSWER A. logic bomb The term "computer virus" is attributed to __________. A. Herman Hollerith B. Fred Cohen C. Charles Babbage D. Albert Einstein - CORRECT ANSWER B. Fred Cohen Computer viruses first appeared in the early __________. A. 1960s B. 1970s C. 1980s D. 1990s - CORRECT ANSWER C. 1980s The __________ is what the virus "does". A. infection mechanism B. trigger C. logic bomb D. payload - CORRECT ANSWER D. payload The __________ is when the virus function is performed. A. dormant phase B. propagation phase C. triggering phase D. execution phase - CORRECT ANSWER D. execution phase During the __________ the virus is idle. A. dormant phase B. propagation phase C. triggering phase D. execution phase - CORRECT ANSWER A. dormant phase A __________ uses macro or scripting code, typically embedded in a document and triggered when the document is viewed or edited, to run and replicate itself into other such documents. A. boot sector infector B. file infector C. macro virus D. multipartite virus - CORRECT ANSWER C. macro virus __________ is the first function in the propagation phase for a network worm. A. Propagating B. Fingerprinting B. Keylogging D. Spear phishing - CORRECT ANSWER B. Fingerprinting Unsolicited bulk e-mail is referred to as __________. A. spam B. propagating C. phishing D. crimeware - CORRECT ANSWER A. spam __________ is malware that encrypts the user's data and demands payment in order to access the key needed to recover the information. A. Trojan horse B. Ransomware C. Crimeware D. Polymorphic - CORRECT ANSWER B. Ransomware A __________ attack is a bot attack on a computer system or network that causes a loss of service to users. A. spam B. phishing C. DDoS D. sniff - CORRECT ANSWER C. DDoS The ideal solution to the threat of malware is __________. A. identification B. removal C. detection D. prevention - CORRECT ANSWER D. prevention __________ will integrate with the operating system of a host computer and monitor program behavior in real time for malicious actions. A. Fingerprint-based scanners B. Behavior-blocking software C. Generic decryption technology D. Heuristic scanners - CORRECT ANSWER B. Behavior-blocking software

Show more Read less
Institution
Network Security
Course
Network Security








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Network Security
Course
Network Security

Document information

Uploaded on
March 23, 2024
Number of pages
4
Written in
2023/2024
Type
Exam (elaborations)
Contains
Unknown

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
paulhans Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
780
Member since
5 year
Number of followers
641
Documents
7050
Last sold
3 days ago
SecureGrade

For all documents, verified, of different complexities: Assignment ,Exams,and Homework GRADED A+ #All the best in your exams.......... success!!!!!

3.5

134 reviews

5
48
4
30
3
23
2
11
1
22

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions