1_2_1 Section 1 – Attacks, Threats, and Vulnerabilities - 1.2 – Attack Types - An Overview of Malware
24 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of malware can transfer from system to system without human intervention?

  • Worms (correct)
  • Keyloggers
  • Ransomware
  • Adware
  • How can Trojan horses trick users into installing malware?

  • By sending phishing emails
  • By posing as legitimate software (correct)
  • By creating pop-up messages
  • By encrypting the data
  • What technique might malware authors use to entice users to click on links and download software?

  • Rootkit installations
  • Drive-by downloads (correct)
  • Phishing attacks
  • Adware infections
  • What is a common way for malware to be installed if an operating system has a vulnerability?

    <p>Drive-by downloads</p> Signup and view all the answers

    How can malware install additional software on a computer after the initial infection?

    <p>Using botnets</p> Signup and view all the answers

    What is a crucial step to prevent the installation of malware?

    <p>Maintaining security updates</p> Signup and view all the answers

    What is malware?

    <p>Malicious software that can have a negative impact on your system</p> Signup and view all the answers

    What is a common function of malware mentioned in the text?

    <p>Collecting keystrokes and screen information</p> Signup and view all the answers

    How do attackers control computers in a botnet?

    <p>By installing malware to turn computers into bots</p> Signup and view all the answers

    What is a potential way for malware owners to earn money, as per the text?

    <p>By showing advertisements on infected computers</p> Signup and view all the answers

    What could be the consequence of malware encrypting your private files?

    <p>You will need to pay for a decryption key to access files</p> Signup and view all the answers

    How does some of the worst malware make money according to the text?

    <p>By distributing advertisements and earning from them</p> Signup and view all the answers

    How can malware authors trick users into installing malware using web pages?

    <p>By embedding links in pop-up messages</p> Signup and view all the answers

    What is one way that a worm can install malware on a vulnerable computer system?

    <p>Taking advantage of OS vulnerabilities for drive-by downloads</p> Signup and view all the answers

    Why is it crucial to maintain the latest security updates on your computer according to the text?

    <p>To avoid vulnerabilities that can be exploited by worms</p> Signup and view all the answers

    What is an example of how malware can install additional software after infecting a computer?

    <p>Running drive-by downloads</p> Signup and view all the answers

    How might a botnet be included with malware on a computer system?

    <p>By being installed by the initial worm</p> Signup and view all the answers

    What technique might malware authors use to encourage users to download software onto their computers?

    <p>Embedding links in pop-up messages</p> Signup and view all the answers

    What is a potential action that malware might perform according to the text?

    <p>Displaying advertisements</p> Signup and view all the answers

    How does malware owners profit from encrypting private files on a victim's computer?

    <p>By requesting a ransom for the decryption key</p> Signup and view all the answers

    What is the primary motive behind turning a computer into a bot within a botnet?

    <p>To allow attackers to control the computer remotely</p> Signup and view all the answers

    In what scenario might an attacker use malware to control multiple computers in a denial of service attack?

    <p>To disrupt the availability of services</p> Signup and view all the answers

    What is a common outcome of malware collecting keystrokes and screen information from a victim's computer?

    <p>Sending the collected data to the attacker</p> Signup and view all the answers

    What type of malware might cause a user's computer to participate in various activities controlled by an attacker?

    <p>Botnet software</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser