Security + Chapter 1 System Security

28 Questions | Total Attempts: 624

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Security Plus


Questions and Answers
  • 1. 
    Programming errors that may result i system compromise, allowing someone to gain unauthorized privileges and the intruder can function as the administrator is called what?
    • A. 

      Privilege Escalation

    • B. 

      Buffer Overflow

    • C. 

      Virus

    • D. 

      Malware infection

    • E. 

      None of the above

  • 2. 
    The most popular method of privilege escalation is what ?
    • A. 

      Malware Infection

    • B. 

      Buffer Infection

    • C. 

      Buffer Overflow `

    • D. 

      Trojan Virus

    • E. 

      Win 32

  • 3. 
    A buffer overflow can result in the following ?
    • A. 

      Overwriting of data or memory settings

    • B. 

      A denial of service due to an overload the input buffer's ability to cope with additional data.

    • C. 

      Computer crashes with CPU space using 100%

    • D. 

      Data is lost due to infection and inoperable

    • E. 

      The originator can execute arbitrary code, often at a privileged level.

  • 4. 
    A program or piece of code that runs on your computer with your knowledge. It is designed to  attach itself to other codes and replicate.
    • A. 

      Spyware

    • B. 

      Trojan

    • C. 

      Boot sector

    • D. 

      Virus

    • E. 

      Adware

  • 5. 
    What is a Boot Sector virus ?
    • A. 

      A virus that infects executable program files and becomes active the memory

    • B. 

      Type of virus that is placed into the first sector of the hardrive so that when the computer boots the virus loads into memory

    • C. 

      Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files

  • 6. 
    What is a Polymorphic virus ? 
    • A. 

      A virus that infects executable program files and becomes active the memory

    • B. 

      Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files

    • C. 

      Type of virus that is placed into the first sector of the hardrive so that when the computer boots the virus loads into memory

    • D. 

      Type of virus that can change form each time it is executed . It was developed to avoid detection

  • 7. 
    What is a Macro Virus
    • A. 

      Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files

    • B. 

      A virus that infects executable program files and becomes active the memory

    • C. 

      Type of virus is inserted into a Microsoft Office document and email to the unsuspecting users.

    • D. 

      Type of virus that can change form each time it is executed . It was developed to avoid detection

  • 8. 
    What is a Stealth Virus ?
    • A. 

      Type of virus uses techniques to avoid detection, temporarily removes itself from an infected file or mask the file's size.

    • B. 

      Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files

    • C. 

      Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files

    • D. 

      Type of virus is inserted into a Microsoft Office document and email to the unsuspecting users.

    • E. 

      Type of virus that can change form each time it is executed . It was developed to avoid detection

  • 9. 
    What is a Multipartite virus?
    • A. 

      Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files

    • B. 

      Type of virus that can change form each time it is executed . It was developed to avoid detection

    • C. 

      Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files

    • D. 

      Type of virus that is a hybrid of a boot and a program viruses. It first attacks the boot sector and then attacks system files and or mask the file size.

  • 10. 
    Worms are similar in function  and behavior to a virus with the exception worms are not self replicating. True or False
    • A. 

      Worms are self replicating and it behaves just like a virus

    • B. 

      Worms are not self replicating and is similar to a spyware /trojan

  • 11. 
     What is a  Trojan?
    • A. 

      A program disguised as a useful application. Trojans do not replicate them like a viruses, but they can be destructive. Trojans perform functions without the users knowledge

    • B. 

      Program that causes slowness and that will corrupt your internet explorer

    • C. 

      Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files

    • D. 

      Program that causes slowness and that will corrupt your internet explorer

  • 12. 
    What is Spy-ware?
    • A. 

      Program that causes slowness and that will corrupt your internet explorer

    • B. 

      Is a software program that communicates information from the user's computer

    • C. 

      Type of virus that is a hybrid of a boot and a program viruses. It first attacks the boot sector and then attacks system files and or mask the file size.

    • D. 

      Is a hardware program that communicates information from the user's computer .

  • 13. 
    What are RootKits?
    • A. 

      Is a piece of software that can be installed and hidden on a computer mainly for the purpose of compromising the system and gaining escalated privileges.

    • B. 

      Is a software program that communicates information from the user's computer

    • C. 

      Program that causes slowness and that will corrupt your internet explorer

    • D. 

      Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files

  • 14. 
    Bots ( short for Robot)Is an automated computer program that needs no user interaction. Bots are system that outside sources and can control.  Bots provides a spam or virus originator with teh venue to propagate.
    • A. 

      True . Bots are controlled by outside sources that need no user interaction.

    • B. 

      False. Bots are used by the user to create a robot that will connect to the internet

  • 15. 
    What is a Logic Bomb?
    • A. 

      Is a virus or Trojan horse designed to execute malicious action when a certain event occurs or a period of time goes by.

    • B. 

      Is a virus designed to execute malicious action when a certain event occurs or a period of time goes by.

    • C. 

      A logic virus that is programed to make decisions on what files and boot sectors to attack.

    • D. 

      Is a trojan horse designed to execute spy-ware and ad-ware actions when certain events occur during a 30 day window.

  • 16. 
    Bios passwords of laptops are a bit different that the passwords are usually flashed into firmware.
    • A. 

      True . Passwords of laptops are a bit different and are usually part of firm ware.

    • B. 

      False. Laptops are designed exactly the same as desktops.

  • 17. 
    You have created a utility  for deframenting hardrives. You have hidden code inside the utility that will install itself and cause the infection system to erase the hardrive contents on April 4, 2010. Which attack is used in this code?
    • A. 

      Spoof virus

    • B. 

      Logic Bomb

    • C. 

      Trojan Horse

    • D. 

      Malware

    • E. 

      Root Kit

  • 18. 
    A vulnerability in the Bios can allow local users to cause which of the following:
    • A. 

      Hard drive failure

    • B. 

      System not to boot

    • C. 

      System to lock up

    • D. 

      DOs ( Denial of Service)

    • E. 

      Complete root kit virus

  • 19. 
    Java application is capable of installing and running on multiple platforms. Because Java is recompiled language  a Java based mini-program is called
    • A. 

      Mini script

    • B. 

      Active X

    • C. 

      Applet

    • D. 

      Cookie

    • E. 

      Temporary file

  • 20. 
    The client side environment support Java applet is referred to a:
    • A. 

      Java script

    • B. 

      Java virtual machine

    • C. 

      Java resource

  • 21. 
    Early version of Java could be used to issue commands to the client system, allowing manipulation of the file and data files at will
    • A. 

      True

    • B. 

      False

  • 22. 
    Early version of JVM (Java Virtual Machine) allowed Java applets to redirect the browser and create connection to other host without the users knowledge.
    • A. 

      True

    • B. 

      False

  • 23. 
    Java is a complied language that can lead to the execution of arbitrary command or direct manipulation of data, while Java Script is a client side interpreted language that mainly poses privacy related vulnerability issues.
    • A. 

      True

    • B. 

      False

  • 24. 
    ________________ are files that may be used to maintain data such as user settings between visits to the same site or multiple days, or to track browsing habits such as those used by sites.
  • 25. 
    What is CGI?
    • A. 

      Cable Gateway Interface

    • B. 

      Common Gate Intermediate

    • C. 

      Common Gateway Interface

Back to Top Back to top