quiz image

1_2_1 Section 1 – Attacks, Threats, and Vulnerabilities - 1.2 – Attack Types - An Overview of Malware

UnmatchedMandolin avatar
UnmatchedMandolin
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What type of malware can transfer from system to system without human intervention?

Worms

How can Trojan horses trick users into installing malware?

By posing as legitimate software

What technique might malware authors use to entice users to click on links and download software?

Drive-by downloads

What is a common way for malware to be installed if an operating system has a vulnerability?

<p>Drive-by downloads</p> Signup and view all the answers

How can malware install additional software on a computer after the initial infection?

<p>Using botnets</p> Signup and view all the answers

What is a crucial step to prevent the installation of malware?

<p>Maintaining security updates</p> Signup and view all the answers

What is malware?

<p>Malicious software that can have a negative impact on your system</p> Signup and view all the answers

What is a common function of malware mentioned in the text?

<p>Collecting keystrokes and screen information</p> Signup and view all the answers

How do attackers control computers in a botnet?

<p>By installing malware to turn computers into bots</p> Signup and view all the answers

What is a potential way for malware owners to earn money, as per the text?

<p>By showing advertisements on infected computers</p> Signup and view all the answers

What could be the consequence of malware encrypting your private files?

<p>You will need to pay for a decryption key to access files</p> Signup and view all the answers

How does some of the worst malware make money according to the text?

<p>By distributing advertisements and earning from them</p> Signup and view all the answers

How can malware authors trick users into installing malware using web pages?

<p>By embedding links in pop-up messages</p> Signup and view all the answers

What is one way that a worm can install malware on a vulnerable computer system?

<p>Taking advantage of OS vulnerabilities for drive-by downloads</p> Signup and view all the answers

Why is it crucial to maintain the latest security updates on your computer according to the text?

<p>To avoid vulnerabilities that can be exploited by worms</p> Signup and view all the answers

What is an example of how malware can install additional software after infecting a computer?

<p>Running drive-by downloads</p> Signup and view all the answers

How might a botnet be included with malware on a computer system?

<p>By being installed by the initial worm</p> Signup and view all the answers

What technique might malware authors use to encourage users to download software onto their computers?

<p>Embedding links in pop-up messages</p> Signup and view all the answers

What is a potential action that malware might perform according to the text?

<p>Displaying advertisements</p> Signup and view all the answers

How does malware owners profit from encrypting private files on a victim's computer?

<p>By requesting a ransom for the decryption key</p> Signup and view all the answers

What is the primary motive behind turning a computer into a bot within a botnet?

<p>To allow attackers to control the computer remotely</p> Signup and view all the answers

In what scenario might an attacker use malware to control multiple computers in a denial of service attack?

<p>To disrupt the availability of services</p> Signup and view all the answers

What is a common outcome of malware collecting keystrokes and screen information from a victim's computer?

<p>Sending the collected data to the attacker</p> Signup and view all the answers

What type of malware might cause a user's computer to participate in various activities controlled by an attacker?

<p>Botnet software</p> Signup and view all the answers

More Quizzes Like This

Computer Security
2 questions

Computer Security

ProperOrangutan59 avatar
ProperOrangutan59
Antivirus Software and Malware Types
10 questions
Types of Malicious Software
10 questions

Types of Malicious Software

BeauteousSetting4581 avatar
BeauteousSetting4581
ISS610S: Malware and Software Threats
40 questions
Use Quizgecko on...
Browser
Browser