Podcast
Questions and Answers
What is the term 'malware' short for?
What is the term 'malware' short for?
- Malicious Application
- Malicious Software (correct)
- Malicious Softwares
- Malicious Ware
What can attackers do with malware?
What can attackers do with malware?
- Steal passwords, steal confidential information, delete information from a system, or even reformat storage devices (correct)
- Only delete information from a system
- Only steal passwords
- Only encrypt information from a system
What is included in malicious code?
What is included in malicious code?
- Only scripts
- Viruses and some other forms of malware
- More than just viruses and some malware can avoid detection (correct)
- Only viruses
What can malware appear in the form of?
What can malware appear in the form of?
What is a program that executes instructions on a computer system?
What is a program that executes instructions on a computer system?
What can an attacker do to a system using malware?
What can an attacker do to a system using malware?
What is the purpose of malware?
What is the purpose of malware?
What can malware be used for in a network?
What can malware be used for in a network?
Which of the following is a security property that malware can compromise by disclosing an organization's private information?
Which of the following is a security property that malware can compromise by disclosing an organization's private information?
What type of malware can modify data in files and databases?
What type of malware can modify data in files and databases?
Which type of malware can cause significant damage to storage media?
Which type of malware can cause significant damage to storage media?
What is a characteristic of a worm?
What is a characteristic of a worm?
What is a common symptom of a virus infection?
What is a common symptom of a virus infection?
What type of virus infects saved documents?
What type of virus infects saved documents?
What is a type of malware that is designed to extort money from victims?
What is a type of malware that is designed to extort money from victims?
What is the primary difference between a virus and a worm?
What is the primary difference between a virus and a worm?
What is a common symptom of a Trojan horse attack?
What is a common symptom of a Trojan horse attack?
What is the primary goal of ransomware?
What is the primary goal of ransomware?
What is spyware primarily used for?
What is spyware primarily used for?
What is adware primarily used for?
What is adware primarily used for?
What is a common way spyware is installed?
What is a common way spyware is installed?
What is a characteristic of adware?
What is a characteristic of adware?
What is a common symptom of a ransomware attack?
What is a common symptom of a ransomware attack?
What is the key difference between adware and spyware?
What is the key difference between adware and spyware?
What is the main objective of adware?
What is the main objective of adware?
What is spyware primarily used for?
What is spyware primarily used for?
How can malware threaten businesses?
How can malware threaten businesses?
What is a common internal threat to businesses?
What is a common internal threat to businesses?
What can be done to ease recovering from potential malware infection?
What can be done to ease recovering from potential malware infection?
What is an important aspect of an Acceptable Use Policy (AUP)?
What is an important aspect of an Acceptable Use Policy (AUP)?
What is a consequence of internal security breaches?
What is a consequence of internal security breaches?
What is the benefit of adopting standardized software?
What is the benefit of adopting standardized software?
How can managers prevent malicious code threats?
How can managers prevent malicious code threats?
What is adware less harmful than?
What is adware less harmful than?
What is a widely recognized security standard?
What is a widely recognized security standard?
What can be used to detect and remove adware?
What can be used to detect and remove adware?
What tool can be used to detect intrusions?
What tool can be used to detect intrusions?
What is a type of malware that poses a threat to businesses?
What is a type of malware that poses a threat to businesses?
What should be scanned for malware before reinstalling software?
What should be scanned for malware before reinstalling software?
What should be disabled during restore procedures or upgrades?
What should be disabled during restore procedures or upgrades?
Flashcards are hidden until you start studying