Mr F Quiz Network

48 Questions | Total Attempts: 764

SettingsSettingsSettings
Please wait...
Network Quizzes & Trivia

.


Questions and Answers
  • 1. 
    Payloads include those used by viruses, worms, and trojans.
    • A. 

      True

    • B. 

      False

  • 2. 
    Malicious software constitutes one of the most significant categories of threats to computer systems.
    • A. 

      True

    • B. 

      False

  • 3. 
    Propagation mechanisms include system corruption, bots, phishing, spyware, and rootkits
    • A. 

      True

    • B. 

      False

  • 4. 
    A backdoor is any mechanism that bypasses a normal security check.
    • A. 

      True

    • B. 

      False

  • 5. 
    Usually, a downloader is sent in an e-mail.
    • A. 

      True

    • B. 

      False

  • 6. 
    A zombie is a program activated on an infected machine that is activated to launch attacks on other machines.
    • A. 

      True

    • B. 

      False

  • 7. 
    Malware can be put into two broad categories, based first on how it spreads or propagates to reach the desired targets and then on the actions or payloads it performs once a target is reached.
    • A. 

      True

    • B. 

      False

  • 8. 
    A virus, although attached to an executable program, cannot do anything that the program is permitted to do
    • A. 

      True

    • B. 

      False

  • 9. 
    Microsoft Word, Excel files, and Adobe PDF are document files that are safe from being infected by viruses.
    • A. 

      True

    • B. 

      False

  • 10. 
    Viruses often morph to evade detection.
    • A. 

      True

    • B. 

      False

  • 11. 
    Many forms of infection can be blocked by denying normal users the right to modify programs on the system
    • A. 

      True

    • B. 

      False

  • 12. 
    A polymorphic virus creates copies during replication that are functionally equivalent but have distinctly different bit patterns, in order to defeat programs that scan for viruses.
    • A. 

      True

    • B. 

      False

  • 13. 
    Worms cannot spread through shared media, such as USB  drives or CD and DVD data disks.
    • A. 

      True

    • B. 

      False

  • 14. 
    To replicate itself, a worm uses some means to access remote systems.
    • A. 

      True

    • B. 

      False

  • 15. 
    Newer worms are limited to Windows machines
    • A. 

      True

    • B. 

      False

  • 16. 
    A ________ lies dormant until a predefined condition is met; the program then triggers an unauthorized act.
    • A. 

      Rootkit

    • B. 

      Worm

    • C. 

      Logic bomb

    • D. 

      Keylogger

  • 17. 
    _________ is software (macro, or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.
    • A. 

      Mobile code

    • B. 

      Adware

    • C. 

      Rootkit

    • D. 

      Spyware

  • 18. 
    1. A__________ is a program that installs other items on a machine that is under attack.
    • A. 

      Flooder

    • B. 

      Rootkit

    • C. 

      Downloader

    • D. 

      Logic bomb

  • 19. 
    1. _________ is software that collects information from a computer and transmits it to another system.
    • A. 

      Spyware

    • B. 

      Exploit

    • C. 

      Flooder

    • D. 

      Trojan horse

  • 20. 
    _________ can result in pop-up ads or redirection of a browser to a commercial site.
    • A. 

      Flooders

    • B. 

      Bots

    • C. 

      Adware

    • D. 

      Kits

  • 21. 
    The _________ is the event or condition that determines when the payload is activated or delivered.
    • A. 

      Propagation phase

    • B. 

      Trigger

    • C. 

      Execution

    • D. 

      infection mechanism

  • 22. 
    During the __________ phase the virus places a copy of itself into other programs or into certain system areas on the disk.
    • A. 

      Dormant

    • B. 

      Triggering

    • C. 

      Propagation

    • D. 

      Execution

  • 23. 
    A(n) _________ virus is a form of virus explicitly designed to hide itself from detection by antivirus software.
    • A. 

      Encrypted

    • B. 

      Polymorphic

    • C. 

      Stealth

    • D. 

      Metamorphic

  • 24. 
    A __________ virus is a virus that mutates with every infection, making detection by the “signature” of the virus impossible.
    • A. 

      Metamorphic

    • B. 

      Encrypted

    • C. 

      Polymorphic

    • D. 

      Stealth

  • 25. 
    A Worm typically uses the __________.
    • A. 

      Dormant phase

    • B. 

      Execution phase

    • C. 

      Triggering phase

    • D. 

      All of the above