Question

incident response course Question 31 The drawback of planting a backdoor on a system is that...

incident response course

Question 31

The drawback of planting a backdoor on a system is that an attacker will likely trigger a defense mechanism when trying to access the system in the future.

True

False

               

Question 32

Hoax viruses are those designed to make the user take action even though no infection or threat exists.

True

False

Question 33

Which of the following is malware that looks legitimate but hides a payload that does something unwanted?

A.            Trojan

B.            Virus

C.            Rootkit

D.            Worm

Question 34

Maria recently discovered that an attacker placed malware on a system used by her company's chief financial officer (CFO) that allowed the attacker to remotely control the system. What type of malware was used in this case?

A.            Keylogger

B.            Worm

C.            Virus

D.            RAT

Question 35

Which of the following types of viruses infects using multiple attack vectors, including the boot sector and executable files on a hard drive?

A.            Polymorphic virus

B.            Macro virus

C.            Logic bomb

D.            Multipartite virus

Homework Answers

Answer #1

(31.) It is true that the drawback of planting a backdoor on a system is that an attacker will likely trigger a defense mechanism when trying to access the system in the future.

(32.) It is true that Hoax viruses are those designed to make the user take action even though no infection or threat exists.

(33.) Option A is correct that is Trojan is malware that looks legitimate but hides a payload that does something unwanted.

(34.) Option D is correct that is RAT (Remote Access Trojan) malware was used in the system used by Maria's company.

(35.) Option D is correct that is Multipartite virus is a type of viruses infects using multiple attack vectors, including the boot sector and executable files on a hard drive.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
incident response course Question 36 Which of the following is a general term for software that...
incident response course Question 36 Which of the following is a general term for software that is inherently hostile, intrusive, or annoying in its operation? A.            Adware B.            Malware C.            Scareware D.            Worm Question 37 Worms require user intervention for their infection to take place; viruses do not. True False Question 38 An attacker can use a keystroke logger to monitor activity on a system and have it reported back to the attacker. True False Question 39 Dean believes that...
incident response course Question 26 One of the main characteristics of worms is that they do...
incident response course Question 26 One of the main characteristics of worms is that they do not need a host program to function. True False                 Question 27 Hardware-based keystroke loggers can be plugged into a universal serial bus (USB) port on a system and monitor the passing signals for keystrokes. True False Question 28 Which of the following is a malware program designed to replicate without attaching to or infecting other files on a host system? A.            Virus B.           ...
incident response course Question 6 Which of the following types of viruses infects and operates through...
incident response course Question 6 Which of the following types of viruses infects and operates through the use of a macro language built into applications, such as Visual Basic for Applications (VBA) in Microsoft Office? A.            Multipartite virus B.            Polymorphic virus C.            Logic bomb D.            Macro virus Question 7 Which of the following types of viruses is a piece of code or software designed to lie in wait on a system until a specified event occurs? A.            Macro virus B.           ...