click below
click below
Normal Size Small Size show me how
SYS-201- Obj 1
SYS-201
| Question | Answer |
|---|---|
| What is the main difference between a worm and a virus? | A worm can replicate itself, while a virus requires a host for distribution. |
| What type of malware monitors your actions? | Spyware |
| A collection of zombie computers have been setup to collect personal information. What type of malware do the zombie computers represent? | Botnet |
| What is a program that appears to be a legitimate application, utility, game, or screensaver and that performs malicious activities surreptitiously? | Trojan horse |
| Describe a logic bomb. | A program that performs a malicious activity at a specific time or after triggering an event. |
| Which of the following is not a common file extension type that should be restricted or blocked as an email attachment due to its likelihood to contain or host a virus? exe, bat, doc, or txt | .txt |
| A new emp has similar acct to others in same job. Audit logs show this user acct has been used to change ACLs on several confidential files and has accessed data in restricted areas. What is this called? | Privilege escalation |
| Which type of malicious activity can be described as numerous unwanted and unsolicited email messages sent to a wide range of victims? | Spamming |
| What is the characteristic of a virus? | Requires an activation mechanism to run. |
| Which of the following is undetectable software that allows administrator level access? | Rootkit |
| What are the characteristics of a rootkit? | requires administrator level privileges for installation and hides itself from detection. |
| When users run software that installs itself as a hidden program that has admin access to various os components; tracks system activity; allows attacker to remotely gain admin access is called what? | rootkit |
| While browsing the internet, you notice that the browser displays ads that are targeted towards recent keyword searches you have performed. What is this an example of? | adware |
| What is the greatest threat to the confidentiality of data in most secure organizations? | USB devices |
| You want to set a password so that when the system boots, the password is required before the os will load. What should you configure? | Set a user password in the BIOS |
| You are concerned about the security threat that removable devices post to confidentiality on your network. What should you implement to reduce this risk? | disable USB devices in the BIOS; Use Group Policy to prevent the installation of removable devices. |
| You want to prevent users from entering the BIOS and changing BIOS setting |