ISS610S: Malware and Software Threats
40 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the term 'malware' short for?

  • Malicious Application
  • Malicious Software (correct)
  • Malicious Softwares
  • Malicious Ware
  • What can attackers do with malware?

  • Steal passwords, steal confidential information, delete information from a system, or even reformat storage devices (correct)
  • Only delete information from a system
  • Only steal passwords
  • Only encrypt information from a system
  • What is included in malicious code?

  • Only scripts
  • Viruses and some other forms of malware
  • More than just viruses and some malware can avoid detection (correct)
  • Only viruses
  • What can malware appear in the form of?

    <p>Code, scripts, active content, and other software</p> Signup and view all the answers

    What is a program that executes instructions on a computer system?

    <p>Malicious software or malware</p> Signup and view all the answers

    What can an attacker do to a system using malware?

    <p>Gain administrative control, send commands directly, or use software programs to harm a system</p> Signup and view all the answers

    What is the purpose of malware?

    <p>To disrupt computer operation</p> Signup and view all the answers

    What can malware be used for in a network?

    <p>To identify and exploit security vulnerabilities</p> Signup and view all the answers

    Which of the following is a security property that malware can compromise by disclosing an organization's private information?

    <p>Confidentiality</p> Signup and view all the answers

    What type of malware can modify data in files and databases?

    <p>Virus</p> Signup and view all the answers

    Which type of malware can cause significant damage to storage media?

    <p>Malware</p> Signup and view all the answers

    What is a characteristic of a worm?

    <p>Does not require a host program to survive</p> Signup and view all the answers

    What is a common symptom of a virus infection?

    <p>Sudden sluggishness of user applications</p> Signup and view all the answers

    What type of virus infects saved documents?

    <p>Macro virus</p> Signup and view all the answers

    What is a type of malware that is designed to extort money from victims?

    <p>Ransomware</p> Signup and view all the answers

    What is the primary difference between a virus and a worm?

    <p>A worm requires a host program to survive</p> Signup and view all the answers

    What is a common symptom of a Trojan horse attack?

    <p>Unrecognized new processes running</p> Signup and view all the answers

    What is the primary goal of ransomware?

    <p>To limit access to important data</p> Signup and view all the answers

    What is spyware primarily used for?

    <p>To collect user browsing habits and website activities</p> Signup and view all the answers

    What is adware primarily used for?

    <p>To collect user activity information for ads</p> Signup and view all the answers

    What is a common way spyware is installed?

    <p>When users download freeware programs</p> Signup and view all the answers

    What is a characteristic of adware?

    <p>It triggers popup ads</p> Signup and view all the answers

    What is a common symptom of a ransomware attack?

    <p>Denied access to important data</p> Signup and view all the answers

    What is the key difference between adware and spyware?

    <p>Adware collects user data for ads, while spyware does not</p> Signup and view all the answers

    What is the main objective of adware?

    <p>To monitor user interests and display relevant ads</p> Signup and view all the answers

    What is spyware primarily used for?

    <p>To monitor user activities and steal personal data</p> Signup and view all the answers

    How can malware threaten businesses?

    <p>Through multiple ways, including attacks on confidentiality, data integrity, and availability of services</p> Signup and view all the answers

    What is a common internal threat to businesses?

    <p>Unsafe computing practices by personnel</p> Signup and view all the answers

    What can be done to ease recovering from potential malware infection?

    <p>Store operating system and data file backup images on external media</p> Signup and view all the answers

    What is an important aspect of an Acceptable Use Policy (AUP)?

    <p>Prohibiting certain network activities and computer user habits</p> Signup and view all the answers

    What is a consequence of internal security breaches?

    <p>Unauthorized access to system and network resources</p> Signup and view all the answers

    What is the benefit of adopting standardized software?

    <p>To control patches and upgrades to address vulnerabilities</p> Signup and view all the answers

    How can managers prevent malicious code threats?

    <p>By enhancing defenses at critical locations and monitoring attacks</p> Signup and view all the answers

    What is adware less harmful than?

    <p>Spyware</p> Signup and view all the answers

    What is a widely recognized security standard?

    <p>ISO/IEC 27002</p> Signup and view all the answers

    What can be used to detect and remove adware?

    <p>Antivirus program</p> Signup and view all the answers

    What tool can be used to detect intrusions?

    <p>All of the above</p> Signup and view all the answers

    What is a type of malware that poses a threat to businesses?

    <p>All of the above</p> Signup and view all the answers

    What should be scanned for malware before reinstalling software?

    <p>New and replacement media</p> Signup and view all the answers

    What should be disabled during restore procedures or upgrades?

    <p>Network access to systems</p> Signup and view all the answers

    Use Quizgecko on...
    Browser
    Browser