Complete). Genuine Exam Questions and
Correct Answers. A+ Graded.
1. Which is a form of cryptography providing confidentiality with a weak form of
authentication or integrity?
- CORRECT ANS >>Symmetric-key encryption
2. What is the main difference between a worm and a virus?
- CORRECT ANS >>A worm can replicate itself, while a virus requires a host for
distribution.
3. What type of malware monitors your actions?
- CORRECT ANS >>Spyware
4. A collection of zombie computers have been set up to collect personal
information. What type of malware to the zombie computers represent?
- CORRECT ANS >>Botnet
5. Which is a program that appears to be a legitimate application, utility, game, or
screensaver and performs malicious activities surreptitiously?
, - CORRECT ANS >>Trojan Horse
6. Which/what of the following is a characteristic of a virus?
- CORRECT ANS >>Requires an activation mechanism to run.
7. You have heard about a new malware program that presents itself to users as a
virus scanner. When users run the software, it installs itself as a hidden program
that has administrator access to various operating system components. The
program then tracks system activity and allows an attacker to remotely gain
administrator access to the computer. Which of the following terms best
describes this software?
Which of the following is undetectable software that allows admin level access?
- CORRECT ANS >>Rootkit
8. What is the primary distinguishing characteristic between a worm and a logic
bomb?
- CORRECT ANS >>Self-replication
9. What is another name for a logic bomb?
- CORRECT ANS >>Asynchronous Attack