Question

incident response course Question 36 Which of the following is a general term for software that...

incident response course

Question 36

Which of the following is a general term for software that is inherently hostile, intrusive, or annoying in its operation?

A.            Adware

B.            Malware

C.            Scareware

D.            Worm

Question 37

Worms require user intervention for their infection to take place; viruses do not.

True

False

Question 38

An attacker can use a keystroke logger to monitor activity on a system and have it reported back to the attacker.

True

False

Question 39

Dean believes that a Trojan may have affected his system. Which command can he use to query for open connections and help to determine if a Trojan is using a specific port?

A.            ping

B.            Ctrl+Alt+Del

C.            netcat

D.            netstat

Question 40

Which of the following types of viruses is designed to change its code and "shape" to avoid detection by virus scanners?

A.            Multipartite virus

B.            Polymorphic virus

C.            Logic bomb

D.            Macro virus

Homework Answers

Answer #1

ANSWERS -

QUESTION 36 - B. Malware

Malware is the malicious software that causes damage to the system and attackers get unauthorised access to the system. Some of the variants are ransomware, viruses etc. It is intrusive, hostile.

QUESTION 37 - FALSE

Worm is a type of malware that doesn't need host function to program in the system or infecting other files.

QUESTION 38 - TRUE

With the help of keystroke logger the attacker can monitor the activity and send report to third party.

QUESTION 39 - D. netstat

netstat command can used to query and displays network status and protocol statistics.

QUESTION 40 - B. Polymorphic virus

Polymorphic virus have the ability to change the shape in order to hide so that they can avoid detection.

=================================END================================

Please comment if u need any other info and DO LEAVE A LIKE, it would mean a lot. Thanks :)

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
incident response course Question 31 The drawback of planting a backdoor on a system is that...
incident response course Question 31 The drawback of planting a backdoor on a system is that an attacker will likely trigger a defense mechanism when trying to access the system in the future. True False                 Question 32 Hoax viruses are those designed to make the user take action even though no infection or threat exists. True False Question 33 Which of the following is malware that looks legitimate but hides a payload that does something unwanted? A.            Trojan B.           ...
incident response course Question 6 Which of the following types of viruses infects and operates through...
incident response course Question 6 Which of the following types of viruses infects and operates through the use of a macro language built into applications, such as Visual Basic for Applications (VBA) in Microsoft Office? A.            Multipartite virus B.            Polymorphic virus C.            Logic bomb D.            Macro virus Question 7 Which of the following types of viruses is a piece of code or software designed to lie in wait on a system until a specified event occurs? A.            Macro virus B.           ...
incident response course Question 26 One of the main characteristics of worms is that they do...
incident response course Question 26 One of the main characteristics of worms is that they do not need a host program to function. True False                 Question 27 Hardware-based keystroke loggers can be plugged into a universal serial bus (USB) port on a system and monitor the passing signals for keystrokes. True False Question 28 Which of the following is a malware program designed to replicate without attaching to or infecting other files on a host system? A.            Virus B.           ...