click below
click below
Normal Size Small Size show me how
Malware Quiz
CompTIA+ topic
| Question | Answers |
|---|---|
| Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as: | c. ransomware |
| A type of software that performs unwanted and harmful actions in disguise of a legitimate and useful program is known as a Trojan horse. This type of malware may act like a legitimate program and have all the expected functionalities... | a. true |
| A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called: | b. worm |
| What is a PUP? (Select 3 answers) | d. application downloaded and installed with the user's consent (legal app) e. type of computer program explicitly classified as malware by AV applications f. type of free, utility software often bundled w/ paid app correct: A, C, D |
| Which type of malware resides only in RAM? | b. fileless virus |
| What is the function of a C2 server? | b. botnet control |
| A malware-infected network host under remote control of a hacker is commonly referred to as: | c. bot |
| Which of the following applies to a collection of intermediary compromised systems that can be used as a platform for a DDoS attack? | a. botnet |
| Which of the following is an example of cryptomalware? | b. ransomware |
| Malicious code activated by a specific event is called: | d. logic bomb |
| Malicious software collecting information about users without their knowledge/consent is known as: | d. spyware |
| Which of the following is an example of spyware? | a. keylogger |
| Which type of Trojan enables unauthorized remote access to a compromised system? | b. rat |
| A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as: | a. rootkit |
| Which of the following refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system? | d. backdoor |