ISS610S: Malware and Software Threats

ISS610S: Malware and Software Threats

Created by
@AffectionateGauss

Questions and Answers

What is the term 'malware' short for?

Malicious Software

What can attackers do with malware?

Steal passwords, steal confidential information, delete information from a system, or even reformat storage devices

What is included in malicious code?

More than just viruses and some malware can avoid detection

What can malware appear in the form of?

<p>Code, scripts, active content, and other software</p> Signup and view all the answers

What is a program that executes instructions on a computer system?

<p>Malicious software or malware</p> Signup and view all the answers

What can an attacker do to a system using malware?

<p>Gain administrative control, send commands directly, or use software programs to harm a system</p> Signup and view all the answers

What is the purpose of malware?

<p>To disrupt computer operation</p> Signup and view all the answers

What can malware be used for in a network?

<p>To identify and exploit security vulnerabilities</p> Signup and view all the answers

Which of the following is a security property that malware can compromise by disclosing an organization's private information?

<p>Confidentiality</p> Signup and view all the answers

What type of malware can modify data in files and databases?

<p>Virus</p> Signup and view all the answers

Which type of malware can cause significant damage to storage media?

<p>Malware</p> Signup and view all the answers

What is a characteristic of a worm?

<p>Does not require a host program to survive</p> Signup and view all the answers

What is a common symptom of a virus infection?

<p>Sudden sluggishness of user applications</p> Signup and view all the answers

What type of virus infects saved documents?

<p>Macro virus</p> Signup and view all the answers

What is a type of malware that is designed to extort money from victims?

<p>Ransomware</p> Signup and view all the answers

What is the primary difference between a virus and a worm?

<p>A worm requires a host program to survive</p> Signup and view all the answers

What is a common symptom of a Trojan horse attack?

<p>Unrecognized new processes running</p> Signup and view all the answers

What is the primary goal of ransomware?

<p>To limit access to important data</p> Signup and view all the answers

What is spyware primarily used for?

<p>To collect user browsing habits and website activities</p> Signup and view all the answers

What is adware primarily used for?

<p>To collect user activity information for ads</p> Signup and view all the answers

What is a common way spyware is installed?

<p>When users download freeware programs</p> Signup and view all the answers

What is a characteristic of adware?

<p>It triggers popup ads</p> Signup and view all the answers

What is a common symptom of a ransomware attack?

<p>Denied access to important data</p> Signup and view all the answers

What is the key difference between adware and spyware?

<p>Adware collects user data for ads, while spyware does not</p> Signup and view all the answers

What is the main objective of adware?

<p>To monitor user interests and display relevant ads</p> Signup and view all the answers

What is spyware primarily used for?

<p>To monitor user activities and steal personal data</p> Signup and view all the answers

How can malware threaten businesses?

<p>Through multiple ways, including attacks on confidentiality, data integrity, and availability of services</p> Signup and view all the answers

What is a common internal threat to businesses?

<p>Unsafe computing practices by personnel</p> Signup and view all the answers

What can be done to ease recovering from potential malware infection?

<p>Store operating system and data file backup images on external media</p> Signup and view all the answers

What is an important aspect of an Acceptable Use Policy (AUP)?

<p>Prohibiting certain network activities and computer user habits</p> Signup and view all the answers

What is a consequence of internal security breaches?

<p>Unauthorized access to system and network resources</p> Signup and view all the answers

What is the benefit of adopting standardized software?

<p>To control patches and upgrades to address vulnerabilities</p> Signup and view all the answers

How can managers prevent malicious code threats?

<p>By enhancing defenses at critical locations and monitoring attacks</p> Signup and view all the answers

What is adware less harmful than?

<p>Spyware</p> Signup and view all the answers

What is a widely recognized security standard?

<p>ISO/IEC 27002</p> Signup and view all the answers

What can be used to detect and remove adware?

<p>Antivirus program</p> Signup and view all the answers

What tool can be used to detect intrusions?

<p>All of the above</p> Signup and view all the answers

What is a type of malware that poses a threat to businesses?

<p>All of the above</p> Signup and view all the answers

What should be scanned for malware before reinstalling software?

<p>New and replacement media</p> Signup and view all the answers

What should be disabled during restore procedures or upgrades?

<p>Network access to systems</p> Signup and view all the answers

More Quizzes Like This

Use Quizgecko on...
Browser
Browser