Describe a macro virus.
  • software that is intended to damage or disable computers and computer systemsenters a computer system without the users knowledge
  • hides the existence of certain processes or programs on a computer from regular detection methods allowing it or another malicious process to access the computer
  • a form of malware which presents unwanted advertisements to the user of a computer
  • one of the most common data file viruses written in marco script aa bunch of instructions that can be grouped together as one demand
What are botnets?
  • software that is intended to damage or disable computers and computer systemsenters a computer system without the users knowledge
  • a stand alone malware computer program that replicates itself in order to spread to other computers
  • a form of malware which presents unwanted advertisements to the user of a computer
  • a network of private computers infected with malicious software
The physical procedure whereby an unauthorized person gains access to a location by following an authorized user is known as?
  • easter egg
  • tailgating
  • keylogger
  • ransoware
In the ____________________ technique, the virus is divided into several parts and the parts are placed at random positions throughout the host program, overwriting the original contents of the host.
  • split infection
  • oligomorphic malware
  • social engineering
  • swiss cheese
Software or a hardware device that captures and stores each keystroke that a user types on the computer's keyboard.​
  • keylogger
  • True
  • tailgating
  • ransoware
What kind of software program delivers advertising content in a manner that is unexpected and unwanted by the user, and is typically included in malware?
  • adware
  • ransoware
  • a marco
  • easter egg
What term below is used to describe a means of gathering information for an attack by relying on the weaknesses of individuals?
  • easter egg
  • tailgating
  • oligomorphic malware
  • social engineering
Of the three types of mutating malware, what type changes its internal code to one of a set number of predefined mutations whenever it is executed?
  • split infection
  • oligomorphic malware
  • viruses and trojens
  • social engineering
What is malware?
  • one of the most common data file viruses written in marco script aa bunch of instructions that can be grouped together as one demand
  • software that is intended to damage or disable computers and computer systemsenters a computer system without the users knowledge
  • a stand alone malware computer program that replicates itself in order to spread to other computers
  • a form of malware which presents unwanted advertisements to the user of a computer
A(n) ____________________ is either a small hardware device or a program that monitors each keystroke a user types on the computer's keyboard.
  • adware
  • keylogger
  • rootkit
  • malware
What is a backdoor and what is it used for?
  • a backdoor gives an attacker access to a computer, program, or service that has any normal security protectionsit is sometimes used for developers who want to bypass security settings until their program is finalized but its also use by attackers to bypass security settings for their own reasoning
  • The virus first appends itself to the end of a file then moves the first three bytes of the original file to the virus code and replaces them with a jump instruction pointing to the virus code then when the program is launched the jump instruction redirects control to the virus
  • erases files from hard driveturns off computers security settingsmakes copies of itselfharms/ruins computer
  • a network of private computers infected with malicious software
A software program that delivers advertising content in a manner that is unexpected and unwanted by the user.
  • keylogger
  • adware
  • ransoware
  • True
How does a rootkit work?
  • one of the most common data file viruses written in marco script aa bunch of instructions that can be grouped together as one demand
  • erases files from hard driveturns off computers security settingsmakes copies of itselfharms/ruins computer
  • hides the existence of certain processes or programs on a computer from regular detection methods allowing it or another malicious process to access the computer
  • a network of private computers infected with malicious software
A computer virus that is written in a script known as a macro
  • malware
  • viruses and trojens
  • trust
  • marco virus
A phishing attack that targets only specific users
  • computer virus
  • watering hole
  • vishing
  • spear fishing
Malware that locks or prevents a device from functioning properly until a fee has been paid is known as:​
  • ransoware
  • keylogger
  • adware
  • malware
How many different Microsoft Windows file types can be infected with a virus?
  • True
  • spim
  • virus
  • 70
What type of attack is targeted against a smaller group of specific individuals, such as the major executives working for a manufacturing company?​
  • backdoor
  • spear fishing
  • computer virus
  • watering hole
A logical computer network of zombies under the control of an attacker.​
  • botnet
  • source
  • marco virus
  • adware
Select below the type of malware that appears to have a legitimate use, but actually contains or does something malicious
  • True
  • trust
  • trojen
  • keylogger
_______________ is a general term used to describe software that secretly spies on users by collecting information without their consent.
  • keylogger
  • hoax
  • spyware
  • logic bomb
One of the armored virus infection techniques utilizes encryption to make virus code more difficult to detect, in addition to separating virus code into different pieces and inject these pieces throughout the infected program code. What is the name for this technique?
  • oligomorphic malware
  • split infection
  • viruses
  • swiss cheese
Computer code that is typically added to a legitimate program but lies dormant until it is triggered by a specific logical event is known as a?
  • oligomorphic malware
  • backdoor
  • logic bomb
  • spyware
What type of malware consists of a set of software tools used by an attacker to hide the actions or presence of other types of malicious software, such as Trojans, viruses, or worms?
  • rootkit
  • virus
  • easter egg
  • a marco
A macro virus takes advantage of the "____________________" relationship between the application and the operating system.
  • True
  • trust
  • trojen
  • virus
Malicious software, or ____________________, silently infiltrate computers with the intent to do harm
  • False
  • source
  • malware
  • adware
A false warning designed to trick users into changing security settings on their computer​
  • logic bomb
  • computer virus
  • backdoor
  • hoax
The two types of malware that require user intervention to spread are:
  • social engineering
  • viruses and trojens
  • program virus
  • oligomorphic malware
A series of instructions that can be grouped together as a single command and are often used to automate a complex set of tasks or a repeated series of tasks are known as:
  • malware
  • a marco
  • rootkit
  • adware
Which of the following is not one of the four methods for classifying the various types of malware?​
  • spim
  • adware
  • viruses
  • source
Due to the prevalence of text filters for filtering spam, how have spammers modified their attacks?
  • erases files from hard driveturns off computers security settingsmakes copies of itselfharms/ruins computer
  • viruses and trojens
  • spim
  • they replace the text with a picture because text filters cannot filter out txt on a picture
What is a worm?
  • a form of malware which presents unwanted advertisements to the user of a computer
  • a stand alone malware computer program that replicates itself in order to spread to other computers
  • a backdoor gives an attacker access to a computer, program, or service that has any normal security protectionsit is sometimes used for developers who want to bypass security settings until their program is finalized but its also use by attackers to bypass security settings for their own reasoning
  • one of the most common data file viruses written in marco script aa bunch of instructions that can be grouped together as one demand
What type of undocumented yet benign hidden feature launches after a special set of commands, key combinations, or mouse clicks, and was no longer included in Microsoft software after the start of their Trustworthy Computing initiative?
  • rootkit
  • virus
  • easter egg
  • a marco
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0