Quiz : How Much Do You Know About The Fundamentals Of Malware Awareness

25 Questions | Attempts: 2304
Share

SettingsSettingsSettings
Quiz : How Much Do You Know About The Fundamentals Of Malware Awareness - Quiz

We welcome you to the fundamentals of malware awareness. The quiz contains questions about malware threats and management. Do you think you can ace this super fun quiz with flying colors? Please make sure to read all the questions very carefully before answering. This fun quiz will brush your memory about the concept and test your knowledge. So, make sure to attempt it well. All the questions in the quiz are compulsory. There is no time bar. You can take this quiz as many times as you like. Good Luck!


Questions and Answers
  • 1. 
    What aspect of the threat landscape is most related to infrastructure vulnerabilities?
    • A. 

      Rogue anti-spyware

    • B. 

      Security holes in software

    • C. 

      Online gaming

    • D. 

      Phishing

  • 2. 
    What do malware authors use when they deploy codes that specifically target victims and lure them to malicious websites? (Choose all that apply)
    • A. 

      Viruses

    • B. 

      Social engineering

    • C. 

      Rogue anti-spyware

    • D. 

      Phishing

  • 3. 
    Which are forms of content-based threats?
    • A. 

      Spam

    • B. 

      File infector families

    • C. 

      Phishing

    • D. 

      Worms

  • 4. 
    Which threats are on the increase? (Choose all that apply)
    • A. 

      Image Spam

    • B. 

      Enhanced attachments

    • C. 

      Timely subject headings

    • D. 

      Rogue anti-spyware

  • 5. 
    What is one difficulty in defining the extent of botnet threats in the threat landscape?
    • A. 

      Botnet applications are untraceable

    • B. 

      Botnets are inherently difficult to identify

    • C. 

      Talented IT professionals in countries with organized crime develop botnets

    • D. 

      Many users are unaware that their system has been compromised

  • 6. 
    Which traits do all malware – viruses, worms and tojans share in common? (Choose all that apply.)
    • A. 

      They originate from outside the network

    • B. 

      They use or damage computer resources.

    • C. 

      They enter computer systems, usually without the user’s knowledge or intent.

    • D. 

      They release hidden payloads designed to damage hard drives and corrupt data files

  • 7. 
    What is the defining characteristic of Trojan horse programs?
    • A. 

      They appear to be harmless but hide malicious intent.

    • B. 

      They are not intended to cause harm and only make fun of the user.

    • C. 

      They replicate and attach themselves to host files.

    • D. 

      They do not require user intervention to spread or function.

  • 8. 
    Why are worms described as “self-contained"?
    • A. 

      Worms do not replicate.

    • B. 

      Worms do not spread to other computer systems.

    • C. 

      Worms do not require a host file to spread.

    • D. 

      Worms do not carry payloads.

  • 9. 
    How does a mass mailing worm spread? (Choose all that apply.)
    • A. 

      Create a copy of itself in a directory

    • B. 

      Create a registry entry

    • C. 

      Get email addresses

    • D. 

      Executes a program

  • 10. 
    How are damages arising from computer threats categorized?
    • A. 

      Lost productivity, recovery and cleanup costs, lost data, and damaged reputations

    • B. 

      Lost productivity, increased vulnerability to future virus attacks, loss of confidential data, loss of other data

    • C. 

      Network downtime, decreased availability of computer resources, disk damage, and problems in virus isolation

    • D. 

      Network disconnection, increased errors in the network, and damaged reputation due to loss of customer data

  • 11. 
    Which form of grayware has infected your computer if your keystroke data is logged?
    • A. 

      Adware

    • B. 

      Browser Helper Object

    • C. 

      Keylogger

    • D. 

      Trackware

  • 12. 
    Which form of grayware is used to crack software copyright protection keys?
    • A. 

      Browser Helper Object

    • B. 

      Keylogger

    • C. 

      Keygen

    • D. 

      Spyware

  • 13. 
    Which form of grayware tries to tempt users to use create a connection to the Internet using a telephone line and connection fee?
    • A. 

      Spyware

    • B. 

      Dialer

    • C. 

      Hacking Tool

    • D. 

      Joke Program

  • 14. 
    Which computer behavior would make you suspect that you might be installing grayware? (Choose all that apply.)
    • A. 

      Additional programs are also being installed at the time of installation

    • B. 

      ActiveX is being used as an installer

    • C. 

      A Browser Helper Object (BHO) plug-in gets installed on the browser

    • D. 

      The browser security settings remain the same

  • 15. 
    Which computer behavior would make you suspect that you are running grayware on a machine without your consent? (Choose all that apply)
    • A. 

      Advertising banners are displayed

    • B. 

      The computer performs an auto-restart

    • C. 

      The system becomes unstable

    • D. 

      The computer disconnects from the Internet

  • 16. 
    How can a mail delivery error be a threat to a user?
    • A. 

      The message could contain malware attachments that cause problems if the user clicks on it.

    • B. 

      The message may be delayed.

    • C. 

      The error may actually be a Man-in-the-Middle attack.

    • D. 

      The email message automatically poses a threat.

  • 17. 
    What is the defining characteristic of an Account Information social engineering ploy?
    • A. 

      The user is asked to click on an attachment to view false account information.

    • B. 

      The user will not be able to identify the threat.

    • C. 

      The user is asked to click on a link that takes them to a site intended to get account information.

    • D. 

      The user downloads account software and infects the computer with malware.

  • 18. 
    What type of social engineering and malware design take advantage of a user’s guilt?
    • A. 

      Accusatory

    • B. 

      Free Stuff

    • C. 

      Generic Conversations

    • D. 

      Virus Alert

  • 19. 
    What graphical technique is used to prevent spammers from attacking a Website and allow legitimate users access to information?
    • A. 

      Graphical User Interface (GUI)

    • B. 

      A captcha

    • C. 

      A browser plug-in

    • D. 

      Adware pop-up

  • 20. 
    What message characteristics indicate that you are the recipient of a Phishing attack? (Choose all that apply)
    • A. 

      Email address

    • B. 

      Greeting does not have a first and last name

    • C. 

      Typing errors in the messages from businesses

    • D. 

      Alarmist tone in the message

  • 21. 
    Why does the Trend Micro Smart Protection Network (SPN) use in-the-cloud technologies for monitoring threats?
    • A. 

      That is where the threats are located

    • B. 

      Threats can be scanned more quickly there

    • C. 

      The technologies are developed for in-the-cloud locations

    • D. 

      It is faster to use Trend Micro’s updated solutions in the cloud, than to perform the daily updates on a machine to protect against the new Web threats of the day

  • 22. 
    Which Trend Micro Smart Protection Network (SPN) technology performs a data crawl of each file hosted on a Web page to confirm the reputation of that page?
    • A. 

      File reputation technology

    • B. 

      Web reputation technology

    • C. 

      Email reputation technology

    • D. 

      Correlation technology

  • 23. 
    Which Trend Micro solution provides security with the following: anti-spyware, anti-Spam, antivirus, and anti-Phishing?
    • A. 

      HouseCall Server Edition

    • B. 

      Mobile Security

    • C. 

      OfficeScan

    • D. 

      Network VirusWall Enforcer

  • 24. 
    What characteristic of a web site is being checked when your security software checks the “In the Cloud” layer?
    • A. 

      Firewall settings

    • B. 

      Internet connection

    • C. 

      Website reputation

    • D. 

      URL validity

  • 25. 
    What does Trend Protect help you avoid? (Choose all that apply)
    • A. 

      Web pages with unwanted content

    • B. 

      Web pages that require too much bandwidth

    • C. 

      Web pages with downloads

    • D. 

      Web pages with hidden threats

Back to Top Back to top
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.