Fundamentals Of Malware Awareness Pre-assessment

25 Questions | Total Attempts: 1290

SettingsSettingsSettings
Please wait...
Fundamentals Of Malware Awareness Pre-assessment

Quiz contains fundamental questions related to malware. Reference from Trendmicro, Inc. Documentation on Fundamentals of Malware Awareness.


Questions and Answers
  • 1. 
    What aspect of the threat landscape is most related to infrastructure vulnerabilities?
    • A. 

      Rogue anti-spyware

    • B. 

      Security holes in software

    • C. 

      Online gaming

    • D. 

      Phishing

  • 2. 
    What do malware authors use when they deploy codes that specifically target victims and lure them to malicious websites? (Choose all that apply)
    • A. 

      Viruses

    • B. 

      Social engineering

    • C. 

      Rogue anti-spyware

    • D. 

      Phishing

  • 3. 
    Which are forms of content-based threats?
    • A. 

      Spam

    • B. 

      File infector families

    • C. 

      Phishing

    • D. 

      Worms

  • 4. 
    Which threats are on the increase? (Choose all that apply)
    • A. 

      Image Spam

    • B. 

      Enhanced attachments

    • C. 

      Timely subject headings

    • D. 

      Rogue anti-spyware

  • 5. 
    What is one difficulty in defining the extent of botnet threats in the threat landscape?
    • A. 

      Botnet applications are untraceable

    • B. 

      Botnets are inherently difficult to identify

    • C. 

      Talented IT professionals in countries with organized crime develop botnets

    • D. 

      Many users are unaware that their system has been compromised

  • 6. 
    Which traits do all malware – viruses, worms and tojans share in common? (Choose all that apply.)
    • A. 

      They originate from outside the network

    • B. 

      They use or damage computer resources.

    • C. 

      They enter computer systems, usually without the user’s knowledge or intent.

    • D. 

      They release hidden payloads designed to damage hard drives and corrupt data files

  • 7. 
    What is the defining characteristic of Trojan horse programs?
    • A. 

      They appear to be harmless but hide malicious intent.

    • B. 

      They are not intended to cause harm and only make fun of the user.

    • C. 

      They replicate and attach themselves to host files.

    • D. 

      They do not require user intervention to spread or function.

  • 8. 
    Why are worms described as “self-contained"?
    • A. 

      Worms do not replicate.

    • B. 

      Worms do not spread to other computer systems.

    • C. 

      Worms do not require a host file to spread.

    • D. 

      Worms do not carry payloads.

  • 9. 
    How does a mass mailing worm spread? (Choose all that apply.)
    • A. 

      Create a copy of itself in a directory

    • B. 

      Create a registry entry

    • C. 

      Get email addresses

    • D. 

      Executes a program

  • 10. 
    How are damages arising from computer threats categorized?
    • A. 

      Lost productivity, recovery and cleanup costs, lost data, and damaged reputations

    • B. 

      Lost productivity, increased vulnerability to future virus attacks, loss of confidential data, loss of other data

    • C. 

      Network downtime, decreased availability of computer resources, disk damage, and problems in virus isolation

    • D. 

      Network disconnection, increased errors in the network, and damaged reputation due to loss of customer data

  • 11. 
    Which form of grayware has infected your computer if your keystroke data is logged?
    • A. 

      Adware

    • B. 

      Browser Helper Object

    • C. 

      Keylogger

    • D. 

      Trackware

  • 12. 
    Which form of grayware is used to crack software copyright protection keys?
    • A. 

      Browser Helper Object

    • B. 

      Keylogger

    • C. 

      Keygen

    • D. 

      Spyware

  • 13. 
    Which form of grayware tries to tempt users to use create a connection to the Internet using a telephone line and connection fee?
    • A. 

      Spyware

    • B. 

      Dialer

    • C. 

      Hacking Tool

    • D. 

      Joke Program

  • 14. 
    Which computer behavior would make you suspect that you might be installing grayware? (Choose all that apply.)
    • A. 

      Additional programs are also being installed at the time of installation

    • B. 

      ActiveX is being used as an installer

    • C. 

      A Browser Helper Object (BHO) plug-in gets installed on the browser

    • D. 

      The browser security settings remain the same

  • 15. 
    Which computer behavior would make you suspect that you are running grayware on a machine without your consent? (Choose all that apply)
    • A. 

      Advertising banners are displayed

    • B. 

      The computer performs an auto-restart

    • C. 

      The system becomes unstable

    • D. 

      The computer disconnects from the Internet

  • 16. 
    How can a mail delivery error be a threat to a user?
    • A. 

      The message could contain malware attachments that cause problems if the user clicks on it.

    • B. 

      The message may be delayed.

    • C. 

      The error may actually be a Man-in-the-Middle attack.

    • D. 

      The email message automatically poses a threat.

  • 17. 
    What is the defining characteristic of an Account Information social engineering ploy?
    • A. 

      The user is asked to click on an attachment to view false account information.

    • B. 

      The user will not be able to identify the threat.

    • C. 

      The user is asked to click on a link that takes them to a site intended to get account information.

    • D. 

      The user downloads account software and infects the computer with malware.

  • 18. 
    What type of social engineering and malware design take advantage of a user’s guilt?
    • A. 

      Accusatory

    • B. 

      Free Stuff

    • C. 

      Generic Conversations

    • D. 

      Virus Alert

  • 19. 
    What graphical technique is used to prevent spammers from attacking a Website and allow legitimate users access to information?
    • A. 

      Graphical User Interface (GUI)

    • B. 

      A captcha

    • C. 

      A browser plug-in

    • D. 

      Adware pop-up

  • 20. 
    What message characteristics indicate that you are the recipient of a Phishing attack? (Choose all that apply)
    • A. 

      Email address

    • B. 

      Greeting does not have a first and last name

    • C. 

      Typing errors in the messages from businesses

    • D. 

      Alarmist tone in the message

  • 21. 
    Why does the Trend Micro Smart Protection Network (SPN) use in-the-cloud technologies for monitoring threats?
    • A. 

      That is where the threats are located

    • B. 

      Threats can be scanned more quickly there

    • C. 

      The technologies are developed for in-the-cloud locations

    • D. 

      It is faster to use Trend Micro’s updated solutions in the cloud, than to perform the daily updates on a machine to protect against the new Web threats of the day

  • 22. 
    Which Trend Micro Smart Protection Network (SPN) technology performs a data crawl of each file hosted on a Web page to confirm the reputation of that page?
    • A. 

      File reputation technology

    • B. 

      Web reputation technology

    • C. 

      Email reputation technology

    • D. 

      Correlation technology

  • 23. 
    Which Trend Micro solution provides security with the following: anti-spyware, anti-Spam, antivirus, and anti-Phishing?
    • A. 

      HouseCall Server Edition

    • B. 

      Mobile Security

    • C. 

      OfficeScan

    • D. 

      Network VirusWall Enforcer

  • 24. 
    What characteristic of a web site is being checked when your security software checks the “In the Cloud” layer?
    • A. 

      Firewall settings

    • B. 

      Internet connection

    • C. 

      Website reputation

    • D. 

      URL validity

  • 25. 
    What does Trend Protect help you avoid? (Choose all that apply)
    • A. 

      Web pages with unwanted content

    • B. 

      Web pages that require too much bandwidth

    • C. 

      Web pages with downloads

    • D. 

      Web pages with hidden threats

Back to Top Back to top