ISS610S: Malware and Software Threats

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the term 'malware' short for?

  • Malicious Application
  • Malicious Software (correct)
  • Malicious Softwares
  • Malicious Ware

What can attackers do with malware?

  • Steal passwords, steal confidential information, delete information from a system, or even reformat storage devices (correct)
  • Only delete information from a system
  • Only steal passwords
  • Only encrypt information from a system

What is included in malicious code?

  • Only scripts
  • Viruses and some other forms of malware
  • More than just viruses and some malware can avoid detection (correct)
  • Only viruses

What can malware appear in the form of?

<p>Code, scripts, active content, and other software (A)</p> Signup and view all the answers

What is a program that executes instructions on a computer system?

<p>Malicious software or malware (D)</p> Signup and view all the answers

What can an attacker do to a system using malware?

<p>Gain administrative control, send commands directly, or use software programs to harm a system (D)</p> Signup and view all the answers

What is the purpose of malware?

<p>To disrupt computer operation (A)</p> Signup and view all the answers

What can malware be used for in a network?

<p>To identify and exploit security vulnerabilities (C)</p> Signup and view all the answers

Which of the following is a security property that malware can compromise by disclosing an organization's private information?

<p>Confidentiality (B)</p> Signup and view all the answers

What type of malware can modify data in files and databases?

<p>Virus (A)</p> Signup and view all the answers

Which type of malware can cause significant damage to storage media?

<p>Malware (C)</p> Signup and view all the answers

What is a characteristic of a worm?

<p>Does not require a host program to survive (D)</p> Signup and view all the answers

What is a common symptom of a virus infection?

<p>Sudden sluggishness of user applications (D)</p> Signup and view all the answers

What type of virus infects saved documents?

<p>Macro virus (D)</p> Signup and view all the answers

What is a type of malware that is designed to extort money from victims?

<p>Ransomware (C)</p> Signup and view all the answers

What is the primary difference between a virus and a worm?

<p>A worm requires a host program to survive (B)</p> Signup and view all the answers

What is a common symptom of a Trojan horse attack?

<p>Unrecognized new processes running (B)</p> Signup and view all the answers

What is the primary goal of ransomware?

<p>To limit access to important data (C)</p> Signup and view all the answers

What is spyware primarily used for?

<p>To collect user browsing habits and website activities (C)</p> Signup and view all the answers

What is adware primarily used for?

<p>To collect user activity information for ads (B)</p> Signup and view all the answers

What is a common way spyware is installed?

<p>When users download freeware programs (B)</p> Signup and view all the answers

What is a characteristic of adware?

<p>It triggers popup ads (A)</p> Signup and view all the answers

What is a common symptom of a ransomware attack?

<p>Denied access to important data (C)</p> Signup and view all the answers

What is the key difference between adware and spyware?

<p>Adware collects user data for ads, while spyware does not (B)</p> Signup and view all the answers

What is the main objective of adware?

<p>To monitor user interests and display relevant ads (C)</p> Signup and view all the answers

What is spyware primarily used for?

<p>To monitor user activities and steal personal data (B)</p> Signup and view all the answers

How can malware threaten businesses?

<p>Through multiple ways, including attacks on confidentiality, data integrity, and availability of services (D)</p> Signup and view all the answers

What is a common internal threat to businesses?

<p>Unsafe computing practices by personnel (D)</p> Signup and view all the answers

What can be done to ease recovering from potential malware infection?

<p>Store operating system and data file backup images on external media (B)</p> Signup and view all the answers

What is an important aspect of an Acceptable Use Policy (AUP)?

<p>Prohibiting certain network activities and computer user habits (D)</p> Signup and view all the answers

What is a consequence of internal security breaches?

<p>Unauthorized access to system and network resources (D)</p> Signup and view all the answers

What is the benefit of adopting standardized software?

<p>To control patches and upgrades to address vulnerabilities (B)</p> Signup and view all the answers

How can managers prevent malicious code threats?

<p>By enhancing defenses at critical locations and monitoring attacks (B)</p> Signup and view all the answers

What is adware less harmful than?

<p>Spyware (B)</p> Signup and view all the answers

What is a widely recognized security standard?

<p>ISO/IEC 27002 (D)</p> Signup and view all the answers

What can be used to detect and remove adware?

<p>Antivirus program (C)</p> Signup and view all the answers

What tool can be used to detect intrusions?

<p>All of the above (D)</p> Signup and view all the answers

What is a type of malware that poses a threat to businesses?

<p>All of the above (D)</p> Signup and view all the answers

What should be scanned for malware before reinstalling software?

<p>New and replacement media (A)</p> Signup and view all the answers

What should be disabled during restore procedures or upgrades?

<p>Network access to systems (C)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Use Quizgecko on...
Browser
Browser