incident response course
Question 31
The drawback of planting a backdoor on a system is that an attacker will likely trigger a defense mechanism when trying to access the system in the future.
True
False
Question 32
Hoax viruses are those designed to make the user take action even though no infection or threat exists.
True
False
Question 33
Which of the following is malware that looks legitimate but hides a payload that does something unwanted?
A. Trojan
B. Virus
C. Rootkit
D. Worm
Question 34
Maria recently discovered that an attacker placed malware on a system used by her company's chief financial officer (CFO) that allowed the attacker to remotely control the system. What type of malware was used in this case?
A. Keylogger
B. Worm
C. Virus
D. RAT
Question 35
Which of the following types of viruses infects using multiple attack vectors, including the boot sector and executable files on a hard drive?
A. Polymorphic virus
B. Macro virus
C. Logic bomb
D. Multipartite virus
(31.) It is true that the drawback of planting a backdoor on a system is that an attacker will likely trigger a defense mechanism when trying to access the system in the future.
(32.) It is true that Hoax viruses are those designed to make the user take action even though no infection or threat exists.
(33.) Option A is correct that is Trojan is malware that looks legitimate but hides a payload that does something unwanted.
(34.) Option D is correct that is RAT (Remote Access Trojan) malware was used in the system used by Maria's company.
(35.) Option D is correct that is Multipartite virus is a type of viruses infects using multiple attack vectors, including the boot sector and executable files on a hard drive.
Get Answers For Free
Most questions answered within 1 hours.