Computer Hardware And Software Startup Functions

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Mekaelejigu
M
Mekaelejigu
Community Contributor
Quizzes Created: 12 | Total Attempts: 12,753
Questions: 10 | Attempts: 190

SettingsSettingsSettings
Computer Hardware And Software Startup Functions - Quiz

.


Questions and Answers
  • 1. 

    Alison discovers that a system under her control has been infected with malware, which is using a key logger to report user keystrokes to a third party. What information security property is this malware attacking?

    • A.

      Option 1

    • B.

      Option 2

    • C.

      Option 3

    • D.

      Confidentiality

    Correct Answer
    D. Confidentiality
    Explanation
    The malware in this scenario is attacking the property of confidentiality. By using a key logger to report user keystrokes to a third party, the malware is compromising the privacy and confidentiality of the user's information. It is unauthorizedly accessing and disclosing sensitive data, violating the principle of confidentiality in information security.

    Rate this question:

  • 2. 

    What is NOT a typical sign of virus activity on a system?

    • A.

      Option 1

    • B.

      Option 2

    • C.

      Unexpected power failures

    • D.

      Option 4

    Correct Answer
    C. Unexpected power failures
    Explanation
    Unexpected power failures are not typically a sign of virus activity on a system. Power failures are usually caused by issues with the electrical supply or hardware malfunctions, rather than by viruses. Virus activity on a system is more commonly indicated by symptoms such as slow performance, frequent crashes, unusual error messages, unauthorized access to files, and unexpected network traffic.

    Rate this question:

  • 3. 

    Which type of virus targets computer hardware and software startup functions?

    • A.

      Option 1

    • B.

      System infector

    • C.

      Option 3

    • D.

      Option 4

    Correct Answer
    B. System infector
    Explanation
    A system infector virus is a type of virus that specifically targets computer hardware and software startup functions. This means that it infects the system files and processes that are responsible for starting up the computer and running the operating system. Once infected, the virus can cause various issues such as system crashes, slow performance, and unauthorized access to the system.

    Rate this question:

  • 4. 

    What file type is least likely to be impacted by a file infector virus?

    • A.

      .exe

    • B.

      .docx

    • C.

      .com

    • D.

      .dll

    Correct Answer
    B. .docx
    Explanation
    File infector viruses typically target executable files such as .exe and .com files, as they can easily inject their malicious code into these types of files. On the other hand, .docx files are Microsoft Word documents that do not contain executable code, making them less likely to be impacted by file infector viruses. However, it is important to note that no file type is completely immune to viruses, and it is always recommended to have antivirus software and practice safe browsing habits.

    Rate this question:

  • 5. 

    Adam discovers a virus on his system that is using encryption to modify itself. The virus escapes detection by signature-based antivirus software. What type of virus has he discovered?

    • A.

      Polymorphic virus

    • B.

      Stealth virus

    • C.

      Cross platform virus

    • D.

      Multipartite virus

    Correct Answer
    A. Polymorphic virus
    Explanation
    Adam has discovered a polymorphic virus. This type of virus is able to modify itself by using encryption, making it difficult for signature-based antivirus software to detect. Polymorphic viruses change their code structure each time they replicate, making it challenging to identify and remove them.

    Rate this question:

  • 6. 

    What program, released in 2013, is an example of ransomware?

    • A.

      BitLocker

    • B.

      Crypt0locker

    • C.

      File Vault

    • D.

      CryptoVault

    Correct Answer
    B. Crypt0locker
    Explanation
    Crypt0locker, released in 2013, is an example of ransomware. Ransomware is a type of malicious software that encrypts a victim's files and demands a ransom in exchange for the decryption key. Crypt0locker gained notoriety for its ability to encrypt files on a victim's computer and network drives, making them inaccessible until the ransom was paid.

    Rate this question:

  • 7. 

    Breanne's system was infected by malicious code after she installed an innocent-looking solitaire game that she downloaded from the Internet. What type of malware did she likely encounter?

    • A.

      Worm

    • B.

      Virus

    • C.

      Trojan horse

    • D.

      Logic bomb

    Correct Answer
    C. Trojan horse
    Explanation
    Breanne likely encountered a Trojan horse malware after installing the innocent-looking solitaire game. Trojan horse malware disguises itself as legitimate software, tricking users into downloading and installing it. Once installed, it can perform malicious activities such as stealing personal information, damaging files, or giving unauthorized access to the attacker. Unlike worms or viruses, Trojan horses do not replicate themselves but rely on social engineering techniques to deceive users. A logic bomb is a type of malware that is triggered by a specific event or condition, which is not applicable in this scenario.

    Rate this question:

  • 8. 

    Bob is developing a web application that depends upon a database backend. What type of attack could a malicious individual use to send commands through his web application to the database?

    • A.

      Cross-site scripting (XSS)

    • B.

      XML injection

    • C.

      SQL injection

    • D.

      LDAP injection

    Correct Answer
    C. SQL injection
    Explanation
    A malicious individual could use SQL injection to send commands through Bob's web application to the database. SQL injection is a type of attack where an attacker inserts malicious SQL code into a query, allowing them to manipulate the database and potentially gain unauthorized access or retrieve sensitive information. By exploiting vulnerabilities in the web application's input validation, the attacker can bypass security measures and execute arbitrary SQL commands.

    Rate this question:

  • 9. 

    Larry recently viewed an auction listing on a website. As a result, his computer executed code that popped up a window that asked for his password. What type of attack has Larry likely encountered?

    • A.

      SQL injection

    • B.

      Command injection

    • C.

      XML injection

    • D.

      Cross-site scripting (XSS)

    Correct Answer
    D. Cross-site scripting (XSS)
    Explanation
    Larry has likely encountered a cross-site scripting (XSS) attack. XSS attacks occur when an attacker injects malicious code into a trusted website, which then executes on the victim's computer. In this case, Larry's computer executed code that popped up a window asking for his password after viewing an auction listing on a website. This is a typical behavior of an XSS attack, where the injected code can manipulate the website's content and interact with the user's browser.

    Rate this question:

  • 10. 

    Yolanda would like to prevent attackers from using her network as a relay point for a smurf attack. What protocol should she block?

    • A.

      HTTP

    • B.

      TCP

    • C.

      ICMP

    • D.

      Option 4

    Correct Answer
    C. ICMP
    Explanation
    Yolanda should block the ICMP protocol to prevent attackers from using her network as a relay point for a smurf attack. ICMP (Internet Control Message Protocol) is commonly exploited in smurf attacks, where attackers send a large number of ICMP echo request packets to IP broadcast addresses, causing a flood of responses to overwhelm the victim's network. By blocking ICMP, Yolanda can prevent her network from being used as a relay point for such attacks.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 20, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • May 16, 2018
    Quiz Created by
    Mekaelejigu
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.