Computer Hardware And Software Startup Functions

10 Questions | Total Attempts: 106

SettingsSettingsSettings
Computer Hardware And Software Startup Functions - Quiz

.


Questions and Answers
  • 1. 
    Alison discovers that a system under her control has been infected with malware, which is using a key logger to report user keystrokes to a third party. What information security property is this malware attacking?
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Confidentiality

  • 2. 
    What is NOT a typical sign of virus activity on a system?
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Unexpected power failures

    • D. 

      Option 4

  • 3. 
    Which type of virus targets computer hardware and software startup functions?
    • A. 

      Option 1

    • B. 

      System infector

    • C. 

      Option 3

    • D. 

      Option 4

  • 4. 
    What file type is least likely to be impacted by a file infector virus?
    • A. 

      .exe

    • B. 

      .docx

    • C. 

      .com

    • D. 

      .dll

  • 5. 
    Adam discovers a virus on his system that is using encryption to modify itself. The virus escapes detection by signature-based antivirus software. What type of virus has he discovered?
    • A. 

      Polymorphic virus

    • B. 

      Stealth virus

    • C. 

      Cross platform virus

    • D. 

      Multipartite virus

  • 6. 
    What program, released in 2013, is an example of ransomware?
    • A. 

      BitLocker

    • B. 

      Crypt0locker

    • C. 

      File Vault

    • D. 

      CryptoVault

  • 7. 
    Breanne's system was infected by malicious code after she installed an innocent-looking solitaire game that she downloaded from the Internet. What type of malware did she likely encounter?
    • A. 

      Worm

    • B. 

      Virus

    • C. 

      Trojan horse

    • D. 

      Logic bomb

  • 8. 
    Bob is developing a web application that depends upon a database backend. What type of attack could a malicious individual use to send commands through his web application to the database?
    • A. 

      Cross-site scripting (XSS)

    • B. 

      XML injection

    • C. 

      SQL injection

    • D. 

      LDAP injection

  • 9. 
    Larry recently viewed an auction listing on a website. As a result, his computer executed code that popped up a window that asked for his password. What type of attack has Larry likely encountered?
    • A. 

      SQL injection

    • B. 

      Command injection

    • C. 

      XML injection

    • D. 

      Cross-site scripting (XSS)

  • 10. 
    Yolanda would like to prevent attackers from using her network as a relay point for a smurf attack. What protocol should she block?
    • A. 

      HTTP

    • B. 

      TCP

    • C. 

      ICMP

    • D. 

      Option 4

Back to Top Back to top