AND ANSWERS (ALREADY
GRADED A+)
Which of the following is a piece of code or software designed to lie in wait on a system
until a specified event occurs?
A. Logic bomb
B. Scareware
C. Hoax
D. Virus - Answer- A. Logic bomb
Which of the following is a piece of code or software that spreads from system to
system by attaching itself to other files?
A. Logic bomb
B. Scareware
C. Hoax
D. Virus - Answer- D. Virus
Which of the following types of viruses possesses code allowing it to hide and mutate
itself in random ways that prevent detection?
A. Hoax
B. Macro
C. Polymorphic
D. Multipartite - Answer- C. Polymorphic
Which of the following types of viruses is designed to make the user take action even
though no infection or threat exists?
, A. Hoax
B. Macro
C. Polymorphic
D. Multipartite - Answer- A. Hoax
Which of the following is not a virus preventative technique?
A. User education
B. Antivirus software
C. Applying updates
D. Allowing external media - Answer- D. Allowing external media
Which of the following is a self-replicating piece of software?
A. Adware
B. Scareware
C. Worm
D. Virus - Answer- C. Worm
Which of the following should be the next step after the identification of an incident?
A. Containment
B. Reporting
C. Analysis
D. Triage - Answer- D. Triage
Interviewing system administrators about technical details of an event most often occurs
in which stage of incident response?
A. Incident identification
B. Triage
C. Reporting