Question

incident response course Question 36 Which of the following is a general term for software that...

incident response course

Question 36

Which of the following is a general term for software that is inherently hostile, intrusive, or annoying in its operation?

A.            Adware

B.            Malware

C.            Scareware

D.            Worm

Question 37

Worms require user intervention for their infection to take place; viruses do not.

True

False

Question 38

An attacker can use a keystroke logger to monitor activity on a system and have it reported back to the attacker.

True

False

Question 39

Dean believes that a Trojan may have affected his system. Which command can he use to query for open connections and help to determine if a Trojan is using a specific port?

A.            ping

B.            Ctrl+Alt+Del

C.            netcat

D.            netstat

Question 40

Which of the following types of viruses is designed to change its code and "shape" to avoid detection by virus scanners?

A.            Multipartite virus

B.            Polymorphic virus

C.            Logic bomb

D.            Macro virus

Homework Answers

Answer #1

ANSWERS -

QUESTION 36 - B. Malware

Malware is the malicious software that causes damage to the system and attackers get unauthorised access to the system. Some of the variants are ransomware, viruses etc. It is intrusive, hostile.

QUESTION 37 - FALSE

Worm is a type of malware that doesn't need host function to program in the system or infecting other files.

QUESTION 38 - TRUE

With the help of keystroke logger the attacker can monitor the activity and send report to third party.

QUESTION 39 - D. netstat

netstat command can used to query and displays network status and protocol statistics.

QUESTION 40 - B. Polymorphic virus

Polymorphic virus have the ability to change the shape in order to hide so that they can avoid detection.

=================================END================================

Please comment if u need any other info and DO LEAVE A LIKE, it would mean a lot. Thanks :)

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
incident response course Question 26 One of the main characteristics of worms is that they do...
incident response course Question 26 One of the main characteristics of worms is that they do not need a host program to function. True False                 Question 27 Hardware-based keystroke loggers can be plugged into a universal serial bus (USB) port on a system and monitor the passing signals for keystrokes. True False Question 28 Which of the following is a malware program designed to replicate without attaching to or infecting other files on a host system? A.            Virus B.           ...
incident response course Question 31 The drawback of planting a backdoor on a system is that...
incident response course Question 31 The drawback of planting a backdoor on a system is that an attacker will likely trigger a defense mechanism when trying to access the system in the future. True False                 Question 32 Hoax viruses are those designed to make the user take action even though no infection or threat exists. True False Question 33 Which of the following is malware that looks legitimate but hides a payload that does something unwanted? A.            Trojan B.           ...
incident response course Question 6 Which of the following types of viruses infects and operates through...
incident response course Question 6 Which of the following types of viruses infects and operates through the use of a macro language built into applications, such as Visual Basic for Applications (VBA) in Microsoft Office? A.            Multipartite virus B.            Polymorphic virus C.            Logic bomb D.            Macro virus Question 7 Which of the following types of viruses is a piece of code or software designed to lie in wait on a system until a specified event occurs? A.            Macro virus B.           ...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT
Active Questions
  • W Mart, one of major retailers, reported cash flows and earning: Comprehensive income) for the firm...
    asked 8 minutes ago
  • Parker Hi-Fi Systems Parker Hi-Fi Systems, located in Wellesley, Massachusetts, a Boston suburb, assembles and sells...
    asked 8 minutes ago
  • Manufacturing companies strive to maintain production​ consistency, but it is often difficult for outsiders to tell...
    asked 19 minutes ago
  • There is a difference between statistical probability and theoretical probability. The theoretical probability of rolling a...
    asked 26 minutes ago
  • In a small struggling technology company, the employees are aware that processes and structures must change...
    asked 38 minutes ago
  • On June 30, 2018, Blue, Inc. leased a machine from Large Leasing Corporation. The lease agreement...
    asked 48 minutes ago
  • You are on a mountain and see three other mountain tops that create a polygonal valley....
    asked 1 hour ago
  • Congressional Ethics: Identify one (1) member of Congress who has been charged with ethics violations in...
    asked 1 hour ago
  • A study had a statistically significant finding that walking 1 mile everyday will reduce the BMI...
    asked 1 hour ago
  • What is meant by electrical equivalent of heat. (define ) What is electrical energy and what...
    asked 1 hour ago
  • A block of mass 1.970  kg is free to slide on a frictionless, horizontal surface. A cord...
    asked 1 hour ago
  • A construction company purchased new equipment for $850,000. It has an estimated useful life of 15...
    asked 1 hour ago