This Security + Chapter 1 System Security quiz assesses knowledge on system vulnerabilities, including privilege escalation through buffer overflows, and various types of malware. It is crucial for understanding security mechanisms and preparing for the CompTIA Security+ certification.
True
False
Rate this question:
A virus that infects executable program files and becomes active the memory
Type of virus that is placed into the first sector of the hardrive so that when the computer boots the virus loads into memory
Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files
Rate this question:
Is a piece of software that can be installed and hidden on a computer mainly for the purpose of compromising the system and gaining escalated privileges.
Is a software program that communicates information from the user's computer
Program that causes slowness and that will corrupt your internet explorer
Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files
Rate this question:
True
False
Rate this question:
Cable Gateway Interface
Common Gate Intermediate
Common Gateway Interface
Rate this question:
Secure Socket Layer
System Socket Layer
Security Socket Layer
Support Socket Layer
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
True
False
Rate this question:
Security Socket Layer
Support Socket Layer
Secure Socket Layer
System Socket Layer
Rate this question:
Spoof virus
Logic Bomb
Trojan Horse
Malware
Root Kit
Rate this question:
A virus that infects executable program files and becomes active the memory
Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files
Type of virus that is placed into the first sector of the hardrive so that when the computer boots the virus loads into memory
Type of virus that can change form each time it is executed . It was developed to avoid detection
Rate this question:
Worms are self replicating and it behaves just like a virus
Worms are not self replicating and is similar to a spyware /trojan
Rate this question:
Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files
Type of virus that can change form each time it is executed . It was developed to avoid detection
Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files
Type of virus that is a hybrid of a boot and a program viruses. It first attacks the boot sector and then attacks system files and or mask the file size.
Rate this question:
Gaining access to a user's pc using remote session.
In computer science, session hijacking refers to the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system. ...
Creating a VPN link without the user's permission and creating a log and password.
Rate this question:
Privilege Escalation
Buffer Overflow
Virus
Malware infection
None of the above
Rate this question:
Rate this question:
Program that causes slowness and that will corrupt your internet explorer
Is a software program that communicates information from the user's computer
Type of virus that is a hybrid of a boot and a program viruses. It first attacks the boot sector and then attacks system files and or mask the file size.
Is a hardware program that communicates information from the user's computer .
Rate this question:
Java script
Java virtual machine
Java resource
Rate this question:
Type of virus uses techniques to avoid detection, temporarily removes itself from an infected file or mask the file's size.
Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files
Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files
Type of virus is inserted into a Microsoft Office document and email to the unsuspecting users.
Type of virus that can change form each time it is executed . It was developed to avoid detection
Rate this question:
Type of virus uses techniques to avoid detection such as temporarily removing itself from infected files
A virus that infects executable program files and becomes active the memory
Type of virus is inserted into a Microsoft Office document and email to the unsuspecting users.
Type of virus that can change form each time it is executed . It was developed to avoid detection
Rate this question:
True . Passwords of laptops are a bit different and are usually part of firm ware.
False. Laptops are designed exactly the same as desktops.
Rate this question:
Spyware
Trojan
Boot sector
Malware
Adware
Rate this question:
Malware Infection
Buffer Infection
Buffer Overflow `
Trojan Virus
Win 32
Rate this question:
Mini script
Active X
Applet
Cookie
Temporary file
Rate this question:
Is a virus or Trojan horse designed to execute malicious action when a certain event occurs or a period of time goes by.
Is a virus designed to execute malicious action when a certain event occurs or a period of time goes by.
A logic virus that is programed to make decisions on what files and boot sectors to attack.
Is a trojan horse designed to execute spy-ware and ad-ware actions when certain events occur during a 30 day window.
Rate this question:
CGI scripts may leak information about the server
CGI allow scripts to be downloaded and and remove boot sectors on servers.
CGI scripts used to process user input data may be exploited to execute unwanted commands and server
CGI allows Trojans and spy-ware to launch directly on server causing network issues.
Rate this question:
Overwriting of data or memory settings
A denial of service due to an overload the input buffer's ability to cope with additional data.
Computer crashes with CPU space using 100%
Data is lost due to infection and inoperable
The originator can execute arbitrary code, often at a privileged level.
Rate this question:
Hard drive failure
System not to boot
System to lock up
DOs ( Denial of Service)
Complete root kit virus
Rate this question:
Quiz Review Timeline (Updated): Feb 2, 2024 +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.