Intro to Network Security sixth ed chapter 2

Your page rank:

Total word count: 989
Pages: 4

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

diffusion

Which of the following is not a primary trait of malware? A. diffusion B. circulation C. infection D. concealment

virus

Which type of malware requires a user to transport it from one computer to another? A. worm B. rootkit C. adware D. virus

D. metamorphic

Which type of mutation completely changes a virus from its original form by rewriting its own code whenever it is executed? A. betamorphic B. oligomorphic C. polymorphic D. metamorphic

C. RAT

Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free program to receive weather reports, but the program had also installed malware on the computer that gave the threat actor unrestricted access to the computer. What type of malware had been downloaded? A. virus B. ransomware C. RAT D. Trojan

C. blocking ransomware

Linnea’s father called her to say that a message suddenly appeared on his screen that says his software license has expired and he must immediately pay $500 to have it renewed before control of the computer will be returned to him. What type of malware is this? A. persistent virusware B. Trojanware C. blocking ransomware D. lockoutware

B. Crypto-malware

Astrid’s computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which time she will receive a means to unlock the files. What type of malware has infected her computer? A. Bitcoin malware B. Crypto-malware C. Blocking virus D. Networked worm

A. Command and control (C&C) server

What is the name of the threat actor’s computer that gives instructions to an infected computer? A. Command and control (C&C) server B. Resource server C. Regulating Net Server (RNS) D. Monitoring and Infecting (M&I) server

D. Send spam email to Moa’s inbox on Tuesday.

Which of these could NOT be defined as a logic bomb? A. If the company’s stock price drops below $100, then credit Juni’s account with 10 additional years of retirement credit. B. Erase all data if Matilda’s name is removed from the list of employees. C. Reformat the hard drive three months after Sigrid left the company. D. Send spam email to Moa’s inbox on Tuesday.

C. A rootkit is always the payload of a Trojan.

Which of the following is NOT correct about a rootkit? A. A rootkit is able to hide its presence or the presence of other malware. B. A rootkit accesses "lower layers" of the operating system. C. A rootkit is always the payload of a Trojan. D. The risk of a rootkit is less today than previously.

C. spyware

Which of these is a general term used for describing software that gathers information without the user’s consent? A. gatherware B. adware C. spyware D. scrapeware

B. Software keyloggers are generally easy to detect.

Which statement regarding a keylogger is NOT true? A. Keyloggers can be used to capture passwords, credit card numbers, or personal information. B. Software keyloggers are generally easy to detect. C. Hardware keyloggers are installed between the keyboard connector and computer keyboard USB port. D. Software keyloggers can be designed to send captured information automatically back to the attacker through the Internet.

B. a smaller group of specific users

A watering hole attack is directed against _____. A. wealthy individuals B. a smaller group of specific users C. all users of a large corporation D. attackers who send spam

A. Whaling

_____ sends phishing messages only to wealthy individuals. A. Whaling B. Spear phishing C. Target phishing D. Microing

C. Intimidation

Lykke receives a call while working at the helpdesk from someone who needs his account reset immediately. When Lykke questions the caller, he says, "If you don’t reset my account immediately, I will call your supervisor!" What psychological approach is the caller attempting to use on Lykke? A. Familiarity B. Scarcity C. Intimidation D. Consensus

C. impersonation

Hedda pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Hedda performed? A. aliasing B. duplicity C. impersonation D. luring

A. A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings.

How can an attacker use a hoax? A. A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings. B. By sending out a hoax, an attacker can convince a user to read his email more often. C. A user who receives multiple hoaxes could contact his supervisor for help. D. Hoaxes are not used by attackers today.

D. books

Which of these items retrieved through dumpster diving would NOT provide useful information? A. calendars B. organizational charts C. memos D. books

B. Tailgating

_____ is following an authorized person through a secure door. A. Tagging B. Tailgating C. Backpacking D. Caboosing

B. it displays the attacker’s programming skills

Each of these is a reason why adware is scorned EXCEPT _____. A. it displays objectionable content B. it displays the attacker’s programming skills C. it can interfere with a user’s productivity D. it can cause a computer to crash or slow down

A. bot herder

What is the term used for a threat actor who controls multiple bots in a botnet? A. bot herder B. zombie shepherd C. rogue IRC D. cyber-robot

Malware

Software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and harmful action.

Virus

A malicious computer code that, like its biological counterpart, reproduces itself on the same computer.

Trojan

An executable program that masquerades as performing a benign activity but also does something malicious.

Remote Access Trojan (RAT)

Ransomeware

Crypto-Malware

Rootkit

Spyware

Keylogger

Adware

Logic Bomb

Backdoor

Bot

Social Engineering

Authority

Intimidation

Consensus

Scarcity

Urgency

Familiarity

Trust

Impersonation

Phishing

Spear Phishing

Whaling

Vishing

Hoax

Watering Hole Attack

Dumpster Diving

Tailgating

Shoulder Surfing

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending