100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Domain 3 Threats and Vulnerabilities (Multiple Choice) questions with complete solutions $10.99   Add to cart

Exam (elaborations)

Domain 3 Threats and Vulnerabilities (Multiple Choice) questions with complete solutions

 0 view  0 purchase
  • Course
  • Institution

Domain 3 Threats and Vulnerabilities (Multiple Choice) questions with complete solutions Which of the following malware types may require user interaction, does not hide itself, and is commonly identified by marketing pop-ups based on browsing habits? A. Botnet B. Rootkit C. Adware D. Virus C...

[Show more]

Preview 2 out of 12  pages

  • June 7, 2022
  • 12
  • 2020/2021
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Domain 3 Threats and Vulnerabilities
(Multiple Choice)
Which of the following malware types may require user interaction, does not hide itself,
and is commonly
identified by marketing pop-ups based on browsing habits?
A. Botnet
B. Rootkit
C. Adware
D. Virus - Answer Correct Answer: C

Adware is free software that is supported by advertisements. Common adware
programs are toolbars, games and utilities. They are free to use, but require you to
watch advertisements as long as the programs are open. Adware typically requires an
active Internet connection to run.

A program has been discovered that infects a critical Windows system executable and
stays dormant in
memory. When a Windows mobile phone is connected to the host, the program infects
the phone's boot loader
and continues to target additional Windows PCs or phones. Which of the following
malware categories BEST
describes this program?

A. Zero-day
B. Trojan
C. Virus
D. Rootkit - Answer Correct Answer: C

A computer virus is a program or piece of code that is loaded onto your computer
without your knowledge and runs against your wishes. Viruses can also replicate
themselves. All computer viruses are man-made. A simple virus that can make a copy
of itself over and over again is relatively easy to produce. Even such a simple virus is
dangerous because it will quickly use all available memory and bring the system to a
halt. An even more dangerous type of virus is one capable of transmitting itself across
networks and bypassing security systems. Some people distinguish between general
viruses and worms. A worm is a special type of virus that can replicate itself and use
memory, but cannot attach itself to other programs.

A user casually browsing the Internet is redirected to a warez site where a number of
pop-ups appear. After
clicking on a pop-up to complete a survey, a drive-by download occurs. Which of the
following is MOST likely
to be contained in the download?

A. Backdoor
B. Spyware

, Domain 3 Threats and Vulnerabilities
(Multiple Choice)
C. Logic bomb
D. DDoS
E. Smurf - Answer Correct Answer: B

Spyware is software that is used to gather information about a person or organization
without their knowledge and sends that information to another entity. Whenever
spyware is used for malicious purposes, its presence is typically hidden from the user
and can be difficult to detect. Some spyware, such as keyloggers, may be installed by
the owner of a shared, corporate, or public computer intentionally in order to monitor
users.

Which of the following malware types typically allows an attacker to monitor a user's
computer, is
characterized by a drive-by download, and requires no user interaction?
A. Virus
B. Logic bomb
C. Spyware
D. Adware - Answer Correct Answer: C

Spyware is software that is used to gather information about a person or organization
without their knowledge and sends that information to another entity.

Sara, a user, downloads a keygen to install pirated software. After running the keygen,
system performance is
extremely slow and numerous antivirus alerts are displayed. Which of the following
BEST describes this type
of malware?

A. Logic bomb
B. Worm
C. Trojan
D. Adware - Answer Correct Answer: C

In computers, a Trojan is a program in which malicious or harmful code is contained
inside apparently harmless programming or data in such a way that it can get control
and do its chosen form of damage, such as ruining the file allocation table on your hard
disk. In one celebrated case, a Trojan was a program that was supposed to find and
destroy computer viruses. A Trojan horse may be widely redistributed as part of a
computer virus

During a server audit, a security administrator does not notice abnormal activity.
However, a network security
analyst notices connections to unauthorized ports from outside the corporate network.
Using specialized tools,

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller EvaTee. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78637 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling

Recently viewed by you


$10.99
  • (0)
  Add to cart