1_2_1 Section 1 – Attacks, Threats, and Vulnerabilities - 1.2 – Attack Types - An Overview of Malware
24 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of malware can transfer from system to system without human intervention?

  • Worms (correct)
  • Keyloggers
  • Ransomware
  • Adware

How can Trojan horses trick users into installing malware?

  • By sending phishing emails
  • By posing as legitimate software (correct)
  • By creating pop-up messages
  • By encrypting the data

What technique might malware authors use to entice users to click on links and download software?

  • Rootkit installations
  • Drive-by downloads (correct)
  • Phishing attacks
  • Adware infections

What is a common way for malware to be installed if an operating system has a vulnerability?

<p>Drive-by downloads (B)</p> Signup and view all the answers

How can malware install additional software on a computer after the initial infection?

<p>Using botnets (A)</p> Signup and view all the answers

What is a crucial step to prevent the installation of malware?

<p>Maintaining security updates (C)</p> Signup and view all the answers

What is malware?

<p>Malicious software that can have a negative impact on your system (C)</p> Signup and view all the answers

What is a common function of malware mentioned in the text?

<p>Collecting keystrokes and screen information (A)</p> Signup and view all the answers

How do attackers control computers in a botnet?

<p>By installing malware to turn computers into bots (D)</p> Signup and view all the answers

What is a potential way for malware owners to earn money, as per the text?

<p>By showing advertisements on infected computers (B)</p> Signup and view all the answers

What could be the consequence of malware encrypting your private files?

<p>You will need to pay for a decryption key to access files (B)</p> Signup and view all the answers

How does some of the worst malware make money according to the text?

<p>By distributing advertisements and earning from them (C)</p> Signup and view all the answers

How can malware authors trick users into installing malware using web pages?

<p>By embedding links in pop-up messages (D)</p> Signup and view all the answers

What is one way that a worm can install malware on a vulnerable computer system?

<p>Taking advantage of OS vulnerabilities for drive-by downloads (C)</p> Signup and view all the answers

Why is it crucial to maintain the latest security updates on your computer according to the text?

<p>To avoid vulnerabilities that can be exploited by worms (D)</p> Signup and view all the answers

What is an example of how malware can install additional software after infecting a computer?

<p>Running drive-by downloads (D)</p> Signup and view all the answers

How might a botnet be included with malware on a computer system?

<p>By being installed by the initial worm (A)</p> Signup and view all the answers

What technique might malware authors use to encourage users to download software onto their computers?

<p>Embedding links in pop-up messages (A)</p> Signup and view all the answers

What is a potential action that malware might perform according to the text?

<p>Displaying advertisements (C)</p> Signup and view all the answers

How does malware owners profit from encrypting private files on a victim's computer?

<p>By requesting a ransom for the decryption key (A)</p> Signup and view all the answers

What is the primary motive behind turning a computer into a bot within a botnet?

<p>To allow attackers to control the computer remotely (C)</p> Signup and view all the answers

In what scenario might an attacker use malware to control multiple computers in a denial of service attack?

<p>To disrupt the availability of services (D)</p> Signup and view all the answers

What is a common outcome of malware collecting keystrokes and screen information from a victim's computer?

<p>Sending the collected data to the attacker (D)</p> Signup and view all the answers

What type of malware might cause a user's computer to participate in various activities controlled by an attacker?

<p>Botnet software (C)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser