Computer Security Chapter 6: Malicious Software
26 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of attack is also known as a user-interface (UI) redress attack?

  • Phishing
  • Clickjacking (correct)
  • Trojan horse
  • Spam
  • What is the primary purpose of social engineering tactics?

  • To trick users into compromising their own systems (correct)
  • To launch a denial-of-service attack
  • To steal sensitive information directly
  • To install malware on a user's device
  • What is the name of the virus that was first seen in 1998 and deletes data on an infected system by overwriting the hard drive with zeroes?

  • Chernobyl virus (correct)
  • Trojan horse
  • Clickjacking
  • Skuller
  • What is the term for unsolicited bulk e-mail that is often used for phishing attacks and malware distribution?

    <p>Spam</p> Signup and view all the answers

    What is the name of the first mobile phone Trojan that appeared in 2004?

    <p>Skuller</p> Signup and view all the answers

    What is the term for a program or utility containing harmful hidden code?

    <p>Trojan horse</p> Signup and view all the answers

    What is the primary objective of Payload System Corruption (2 of 3) Ransomware?

    <p>To encrypt data and demand payment for the decryption key</p> Signup and view all the answers

    What is the term for a collection of bots that can act in a coordinated manner?

    <p>Botnet</p> Signup and view all the answers

    What is the primary goal of Phishing attacks?

    <p>To exploit social engineering to leverage the user's trust</p> Signup and view all the answers

    What is the term for a secret entry point into a program that allows an attacker to gain access and bypass security access procedures?

    <p>Backdoor</p> Signup and view all the answers

    What is the primary goal of Rootkit malware?

    <p>To hide and maintain covert access to a system</p> Signup and view all the answers

    What is the ideal solution to the threat of malware?

    <p>Prevention</p> Signup and view all the answers

    What is the primary approach of First-generation Anti-Virus Software?

    <p>Signature-based scanning</p> Signup and view all the answers

    What is the term for malicious code that is set to 'explode' when certain conditions are met?

    <p>Logic bomb</p> Signup and view all the answers

    What is the primary goal of Perimeter Scanning Approaches?

    <p>To detect and block malware</p> Signup and view all the answers

    What is the term for software that monitors program behavior in real-time for malicious action?

    <p>Host-based behavior-blocking software</p> Signup and view all the answers

    What is malware, according to NIST definition?

    <p>A program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system.</p> Signup and view all the answers

    What is the primary difference between a virus and a worm?

    <p>A virus requires a host program to replicate, while a worm is a self-contained program.</p> Signup and view all the answers

    What is the term for a malicious attack that involves a wide variety of intrusion technologies and malware?

    <p>Advanced Persistent Threat (APT)</p> Signup and view all the answers

    What is the purpose of a trigger event in a virus?

    <p>To activate the virus's payload</p> Signup and view all the answers

    What is the name of the first known worm infection?

    <p>Morris Worm</p> Signup and view all the answers

    What is the term for a program that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics?

    <p>Mobile Code</p> Signup and view all the answers

    What is the primary way that malware spreads through shared media?

    <p>All of the above</p> Signup and view all the answers

    What is the term for a malicious attack that involves compromising websites and then waiting for targeted victims to visit them?

    <p>Watering-Hole Attack</p> Signup and view all the answers

    What is the term for a type of malware that encrypts files and demands a ransom payment to recover them?

    <p>Ransomware</p> Signup and view all the answers

    What is the term for a type of malware that attaches itself to documents and uses the macro programming capabilities of the document's application to execute and propagate?

    <p>Macro Virus</p> Signup and view all the answers

    More Like This

    Identifying Malware on Your Computer
    21 questions
    Computer Security Quiz
    20 questions
    Use Quizgecko on...
    Browser
    Browser