Mr F Quiz Network

48 Questions | Total Attempts: 244

Settings
Please wait...
Network Quizzes & Trivia

.


Questions and Answers
  • 1. 
    Payloads include those used by viruses, worms, and trojans.
    • A. 

      True

    • B. 

      False

  • 2. 
    Malicious software constitutes one of the most significant categories of threats to computer systems.
    • A. 

      True

    • B. 

      False

  • 3. 
    Propagation mechanisms include system corruption, bots, phishing, spyware, and rootkits
    • A. 

      True

    • B. 

      False

  • 4. 
    A backdoor is any mechanism that bypasses a normal security check.
    • A. 

      True

    • B. 

      False

  • 5. 
    Usually, a downloader is sent in an e-mail.
    • A. 

      True

    • B. 

      False

  • 6. 
    A zombie is a program activated on an infected machine that is activated to launch attacks on other machines.
    • A. 

      True

    • B. 

      False

  • 7. 
    Malware can be put into two broad categories, based first on how it spreads or propagates to reach the desired targets and then on the actions or payloads it performs once a target is reached.
    • A. 

      True

    • B. 

      False

  • 8. 
    A virus, although attached to an executable program, cannot do anything that the program is permitted to do
    • A. 

      True

    • B. 

      False

  • 9. 
    Microsoft Word, Excel files, and Adobe PDF are document files that are safe from being infected by viruses.
    • A. 

      True

    • B. 

      False

  • 10. 
    Viruses often morph to evade detection.
    • A. 

      True

    • B. 

      False

  • 11. 
    Many forms of infection can be blocked by denying normal users the right to modify programs on the system
    • A. 

      True

    • B. 

      False

  • 12. 
    A polymorphic virus creates copies during replication that are functionally equivalent but have distinctly different bit patterns, in order to defeat programs that scan for viruses.
    • A. 

      True

    • B. 

      False

  • 13. 
    Worms cannot spread through shared media, such as USB  drives or CD and DVD data disks.
    • A. 

      True

    • B. 

      False

  • 14. 
    To replicate itself, a worm uses some means to access remote systems.
    • A. 

      True

    • B. 

      False

  • 15. 
    Newer worms are limited to Windows machines
    • A. 

      True

    • B. 

      False

  • 16. 
    A ________ lies dormant until a predefined condition is met; the program then triggers an unauthorized act.
    • A. 

      Rootkit

    • B. 

      Worm

    • C. 

      Logic bomb

    • D. 

      Keylogger

  • 17. 
    _________ is software (macro, or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and execute with identical semantics.
    • A. 

      Mobile code

    • B. 

      Adware

    • C. 

      Rootkit

    • D. 

      Spyware

  • 18. 
    1. A__________ is a program that installs other items on a machine that is under attack.
    • A. 

      Flooder

    • B. 

      Rootkit

    • C. 

      Downloader

    • D. 

      Logic bomb

  • 19. 
    1. _________ is software that collects information from a computer and transmits it to another system.
    • A. 

      Spyware

    • B. 

      Exploit

    • C. 

      Flooder

    • D. 

      Trojan horse

  • 20. 
    _________ can result in pop-up ads or redirection of a browser to a commercial site.
    • A. 

      Flooders

    • B. 

      Bots

    • C. 

      Adware

    • D. 

      Kits

  • 21. 
    The _________ is the event or condition that determines when the payload is activated or delivered.
    • A. 

      Propagation phase

    • B. 

      Trigger

    • C. 

      Execution

    • D. 

      infection mechanism

  • 22. 
    During the __________ phase the virus places a copy of itself into other programs or into certain system areas on the disk.
    • A. 

      Dormant

    • B. 

      Triggering

    • C. 

      Propagation

    • D. 

      Execution

  • 23. 
    A(n) _________ virus is a form of virus explicitly designed to hide itself from detection by antivirus software.
    • A. 

      Encrypted

    • B. 

      Polymorphic

    • C. 

      Stealth

    • D. 

      Metamorphic

  • 24. 
    A __________ virus is a virus that mutates with every infection, making detection by the “signature” of the virus impossible.
    • A. 

      Metamorphic

    • B. 

      Encrypted

    • C. 

      Polymorphic

    • D. 

      Stealth

  • 25. 
    A Worm typically uses the __________.
    • A. 

      Dormant phase

    • B. 

      Execution phase

    • C. 

      Triggering phase

    • D. 

      All of the above

  • 26. 
    As an alternative to just destroying data, some malware encrypts the    user’s data and demands payment in order to access the key needed to   recover this information. This is sometimes known as _________ .
    • A. 

      A logic bomb

    • B. 

      Spear-phishing

    • C. 

      Ransomware

    • D. 

      A trapdoor

  • 27. 
    A _________ attack is an attack on a computer system or network that causes a loss of service to users.
    • A. 

      Spam

    • B. 

      Stealth

    • C. 

      DDoS

    • D. 

      Logic bomb

  • 28. 
    The _________ method uses information contained on an infected victim  machine to find more hosts to scan.
    • A. 

      Hit list

    • B. 

      Topological

    • C. 

      Local subnet

    • D. 

      Random

  • 29. 
    There are _________ generations of antivirus software.
    • A. 

      Two

    • B. 

      Three

    • C. 

      Four

    • D. 

      Five

  • 30. 
    In a ________ attack the attacker is able to implant zombiesoftware on a number of sites distributed throughout the Internet.
    • A. 

      Bot

    • B. 

      Reflector DDoS

    • C. 

      DoS

    • D. 

      Direct DDoS

  • 31. 
    1. A _________ is malware that, when executed, tries to replicate itself into other executable code; when it succeeds the code is said to be infected.
  • 32. 
    1. A _________ is a computer program that can run independently and can propagate a complete working version of itself onto other hosts on a network.
  • 33. 
    1. A ________ is a computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms.
  • 34. 
    1. ___________ programs are used to send large volumes of unwanted e-mail.
  • 35. 
    _________ capture keystrokes on a compromised system.
  • 36. 
    1. A __________ is a set of hacker tools used after an attacker has broken into a computer system and gained root-level access.
  • 37. 
    1. A __________  uses multiple methods of infection or propagation, to maximize the speed of contagion and the severity of the attack.
  • 38. 
    1. ________ viruses infect scripting code used to support active content in a variety of user document types.
  • 39. 
    1. The first function in the propagation phase for a network worm is for it to search for other systems to infect, a process known as scanning  or __________.
  • 40. 
    1. The earliest significant worm infection was released onto the Internet by   
    ­­­­­­­_________ in 1988.
  • 41. 
    1. Another approach to exploiting software vulnerabilities exploits
     browser vulnerabilities so that when the user views a Web page   controlled by the attacker, it contains code that exploits the browser bug   to download and install malware on the system without the user’s   knowledge or consent. This is known as a __________  and is a common exploit in recent attack kits.
  • 42. 
    Unsolicited bulk e-mail, commonly known as ________, imposes significant costs on both the network infrastructure needed to relay this traffic and on users who need to filter their legitimate e-mails out of this flood.
  • 43. 
    A _________ attack exploits social engineering to leverage a user’s trust by masquerading as communications from a trusted source.
  • 44. 
    A _________ , also known as a trapdoor, is a secret entry point into a program that allows someone who is aware of the door to gain access without going through the usual security access procedures.
  • 45. 
    1. A _________ is a set of programs installed on a system to maintain covert access to that system with administrator privileges, while hiding evidence of its presence to the greatest extent possible.
  • 46. 
    Is a malicious hacker tools used to break into machines remotely
  • 47. 
    Set of tools for generating new virus automatically
  • 48. 
    _________program activated on an infected machine that is activated to lunch attack on other machines