37 Questions
Which type of malware is concealed within the code of an executable process image stored as a file on disk?
Viruses
What method do boot sector viruses use to infect a computer?
They infect the boot sector code or partition table on a disk drive.
What type of malware is concealed within an installer package for software that appears to be legitimate?
Trojans
Which of the following is a symptom of a security issue in the file system?
Changed file permissions
What is one technique that malware may use to trick users into installing it?
Misusing the push notification system
Which of the following is a common symptom of infection by spyware or adware?
Slow performance
What should you check if a user experiences redirection when entering URL web addresses manually?
DNS servers
Which one of the following is a key indicator of malware infection?
All of the above.
What is one example of crypto-ransomware mentioned in the text?
Cryptolocker
What is the purpose of ransomware payment methods such as wire transfer, cryptocurrency, or premium-rate phone lines?
To extort money from the victim
What is the difficulty of performing blockchain calculations necessary to generate a new digital coin related to?
The total number of coins within a cryptocurrency
Which type of malware can be harder to detect because it disguises itself as script instructions or a document file rather than an executable image file?
Fileless malware
What type of malware is usually designed to implement a backdoor, allowing the threat actor to access the PC and install additional malware tools?
Backdoors
Which type of malware can perform browser reconfigurations, monitor local application activity, and record keystrokes in an attempt to steal confidential information?
Spyware
What is a keylogger?
Malware that actively attempts to steal confidential information by recording keystrokes
Which of the following is a common cause of certificate warnings in web browsers?
The certificate is self-signed or issued by a trusted CA
What can a malicious proxy do if it successfully compromises the trusted root certificate store?
It can intercept and modify encrypted traffic
What is the purpose of antivirus vendors' malware encyclopedias?
To verify known malware indicators and behaviors
What is the primary method of malware discovery?
On-access scanning by an antivirus product
Which of the following is true about rootkits in Windows?
Rootkits can change any system file or programming interface.
What is the purpose of ransomware?
To extort money from the victim.
How can Trojans installed as regular software conceal their presence in Windows?
By using a filename similar to a genuine executable or library.
What does it mean for malware to run with SYSTEM privileges?
It can execute without requiring any authorization.
Which step should be taken after verifying symptoms of a malware infection?
Disconnect the network link
Which action reduces the risk of a privileged account being compromised by malware?
Quarantine the infected system
What should be done with removable media attached to an infected system?
Scan the removable media for malware
Why should System Restore and automated backup systems be disabled on an infected system?
To prevent the malware from accessing backups
Which of the following is the main tool recommended for remediation of an infected system?
Antivirus software
What is the purpose of continual threat/definition updates in antivirus software?
To block any attempt to open infected files
Which terms are synonymous when it comes to protecting against a broad range of threats?
Antivirus and anti-malware
Which of the following is NOT a topic that needs to be covered in security-awareness training?
Social engineering and malware threats
What is one method of malware discovery mentioned in the text?
Completing another antivirus scan
Why are untrained users susceptible to social engineering and phishing attacks?
They are not aware of common social engineering and malware threats
Which of the following tools can be used to terminate suspicious processes during the manual removal of advanced malware?
Task Manager
What is the recommended method to prevent reinfection after cleaning a system from malware?
Disable system restore
Which of the following actions is necessary to perform a complete system restore after a persistent malware infection?
Reinstall the operating system
What is the purpose of configuring scheduled scans for security software?
Prevent malware infection
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free