incident response course
Question 36
Which of the following is a general term for software that is inherently hostile, intrusive, or annoying in its operation?
A. Adware
B. Malware
C. Scareware
D. Worm
Question 37
Worms require user intervention for their infection to take place; viruses do not.
True
False
Question 38
An attacker can use a keystroke logger to monitor activity on a system and have it reported back to the attacker.
True
False
Question 39
Dean believes that a Trojan may have affected his system. Which command can he use to query for open connections and help to determine if a Trojan is using a specific port?
A. ping
B. Ctrl+Alt+Del
C. netcat
D. netstat
Question 40
Which of the following types of viruses is designed to change its code and "shape" to avoid detection by virus scanners?
A. Multipartite virus
B. Polymorphic virus
C. Logic bomb
D. Macro virus
ANSWERS -
QUESTION 36 - B. Malware
Malware is the malicious software that causes damage to the system and attackers get unauthorised access to the system. Some of the variants are ransomware, viruses etc. It is intrusive, hostile.
QUESTION 37 - FALSE
Worm is a type of malware that doesn't need host function to program in the system or infecting other files.
QUESTION 38 - TRUE
With the help of keystroke logger the attacker can monitor the activity and send report to third party.
QUESTION 39 - D. netstat
netstat command can used to query and displays network status and protocol statistics.
QUESTION 40 - B. Polymorphic virus
Polymorphic virus have the ability to change the shape in order to hide so that they can avoid detection.
=================================END================================
Please comment if u need any other info and DO LEAVE A LIKE, it would mean a lot. Thanks :)
Get Answers For Free
Most questions answered within 1 hours.