1. Malware is short for
Answers:
• Malicious Software
• Malicious
Systems
• Maliant Systems
• Maliant Software
2. What is rogue security software?
Answers:
• Security
software that considers data files or programs as viruses, when they are not.
• Security
software that has been compromised to not pick up certain threats
• A fraudulent security program that appears to be helpful,
but is actually not. It may deceive or mislead users into paying money to
remove fake viruses or introduce malware after it is installed.
• Security
software that is no longer being used for the purpose that was intended due to
an exploit or hacker.
3. Is commercial SPAM legal in the United States?
Answers:
• Yes, but only if
it is an advertisement for a real product.
• Yes because it
is protected under the first amendment
• No
• Yes, but only if it follows the standards listed in the
CAN-SPAM Act of 2003
4. Where might a spammer get your personal information from?
Answers:
• LinkedIn
• MySpace
• Facebook
• All of these
5. Which of the following spam filtering techniques has the highest potential for generating false positives?
Answers:
•
Challenge-Response Filtering
• Keyword Filtering
• Bayesian
Filtering
• Community
Filtering
6. Automated spamming tools subscribe to mail lists in order to complete which of the following tasks?
Answers:
• collect email addresses
• introduce
security holes into the list
• deny service to
mail list recipients
7. A virus is a program that attaches itself to (or replaces the contents of) which of the following file types?
Answers:
• Text files
• Source files
• Header files
• Executables
8. Why shouldn't a user click unsubscribe links from spam messages?
Answers:
• clicking the
link will prevent
• the click may validate the email address
• unsubscribing
makes finding the sender difficult
9. What is an example of a Phishing scam?
Answers:
• Hacking into a
computer and leaving false trails on who did it
• Installing a
virus and then asking you to pay to remove it
• An application
that looks useful, but actually contains spyware to slow down your computer
• An email that appears to be legitimate, but is really being
used to obtain personal or important information
10. In order to infect a system, clicking an email attachment must cause which of the following conditions to occur?
Answers:
• the attachment executes
• the attachment
is decompressed
• the attachment
opens in a preview editor
• the attachment
is saved to the disk
11. What could be a good indicator of a Spam email?
Answers:
• Something that
sounds too good to be true
• All of these
• An email sent to
a bunch of random people
• An email that
contains plenty of grammar mistakes
12. In order for antivirus programs to be most effective, it is necessary to keep which of the following up to date?
Answers:
• Virus definition files
• File hashes
• Web browsers
• Antivirus
encryption keys
13. What is a good method for a website owner to confirm a user is not using an account for a spamming purposes?
Answers:
• Users must
associate a phone to their account and confirm a number sent to them via text
• Users that
register must click on a confirmation link to the email they specify in their
profile
• Requiring users
provide valid personal information during sign up
• All of these
14. Which of the following is not a well known anti-virus program?
Answers:
• AVG
• SMAG
• McAFee
• AVAST
15. What is a captcha?
Answers:
• It is a tool websites often use to prevent automated spammer
bots from posting or registering on a website by forcing the user to do a task,
often entering in letters or numbers based on a picture or audio, which
verifies that they are human.
• An SPAM email
written in all caps
• A spam email
that attempts to "capture" information and then use that information
to cause damage; the second phase is often referred to as the
"gotcha" phase.
• A group of
characters in hidden in an email that often includes code used in malware.
16. What are types of malware?
Answers:
• All of these
• Spyware
• Viruses
• Worms
17. How can you help stop spam?
Answers:
• All of these
• Setup email
filters based on keywords known to be in spam
• Unsubscribe from
listservs
• Block certain
email addresses known for sending spam
18. What is a keylogger?
Answers:
• Software used to
log all attempts to access a certain file
• Software that
that records keys you set when encrypting files
• Software that records keystrokes made on a keyboard
• Software that
steals passwords or "keys" that you have saved on your computer
19. Which of these is an example of a possible victim in a phishing attack?
Answers:
• The website that
was hacked
• All of these
• The bank of the
victim
• The person who
had their identity stolen
20. If you cannot delete malware infected file, what is good method to try first?
Answers:
• Run Windows
Repair
• Run Windows
Restore
• Reformat then
attempt to delete the file
• Boot in Windows safe mode and attempt to delete the file
21. A virus can spread to another computer by
Answers:
• Sharing an infected file with another computer
• Pinging other
computers from the infected computer
• Through touch
• Being on the
same network as that computer
22. What is a computer virus?
Answers:
• Software that
steals files from your computer and is used by blackmailers
• A type of malware that replicates itself and spreads to
other files and/or computers.
• Spyware that
slows down a computer by sending statistics to an unknown source
• A software that
hijacks your computer and asks you to pay in order for it to be removed
23. Which of these techniques would be effective in helping to prevent phishing attacks by scammers?
Answers:
• Allow XSS
• Use Pop-ups
• Use IFRAME's
• Scan for and fix XSS issues
24. What is the main difference between spyware and other malware?
Answers:
• There is no
difference
• Malware monitors
data usage, while spyware infects your computer with viruses
• Spyware that
slows down a computer by sending statistics to an unknown source, while malware
only includes threats from inside your own computer
• Spyware tends to steal or monitor data and/or personal
information while malware encompasses all software that may been made with
malicious intent in mind
25. What is a backdoor?
Answers:
• A vulnerability in software that allows someone to bypass
the normal authentication process
• It is where
viruses store their source code and begin to replicate
• It is a known
bug or exploit hackers use to cause software to behave in a way that was not
intended by the manufacturer
• It is a way for
spyware to leave a system without any trace of it being there
26. What run command can you use to check what programs load on startup?
Answers:
• msconfig
• cmd
• startup
• ipconfig
27. Which of the following sites provide services for users to setup disposable emails?
Answers:
• hotmail.com
• jetable.org
• yahoo.com
• gmail.com
28. What is a botnet?
Answers:
• A collection of computers working together to perform a
single task. These computers are often penetrated by software containing
malware.
• A program that
sends emails repeatedly infecting other computers who open it
• Software that
automates networks
• A collection of
malware stored in a network
29. What is an example of a "419" Scam
Answers:
• A con in which someone asks you for assistance in retrieving
a vast sum of money. Often it involves you helping him or her pay off certain
fees and in return they promise to share the money with you.
• Someone who uses
social engineering to gain access to your computer or personal information
• When you
download a program that appears harmless, but it actually installs spyware on
your computer
• Someone who
sends you an email in hopes you open an attachment which contains a virus
30. A client asks you to fix his computer because it has ransomware on it. He says he sees a message as soon as he loads windows, and cannot do anything else. What is the best way to fix this computer without losing any of his data?
Answers:
• Use Windows
Restore
• Boot from a USB drive and run a program to remove the malware
• Reinstall
Windows
• Reformat the
computer
31. Which is not an example of an anti-spyware tool?
Answers:
• Spybot
• Ad-Aware
• Kazaa
• Windows Defender
32. What is an example of a captcha?
Answers:
• What are the
characters in this picture?
• All of these
• An interactive
program which have instructions that read: "Move the triangle into the
circle"
• 1 + 1 = ?
33. Virus infection via email attachments can be minimized using which of the following?
Answers:
• Right clicking
attachments
• Opening
attachments from external hard drives
• Deleting mail containing attachments from unknown senders
• Copying attachments
to special directories before opening them
34. Why are disposable email addresses useful?
Answers:
• It is useful for
spammers to create false email addresses that does not exist in order to spoof
the from email in their spam messsages.
• It is useful for someone who needs to give out their email
or sign up to a website, but wants to protect their real email address from
SPAM.
• It is useful for
people who do not want their emails to be read
• It is useful for
spammers who want to send out a one time mass email, but never use that same
email address again
35. You have been told by several of your friends you have recently sent SPAM emails to them, what could be the cause of this and what should you do?
Answers:
• A spammer or bot may have gained access to your email
account and sent out SPAM to all of your contacts. You should change your
password immediately.
• A spammer is
spoofing your email address. You should tell your friends to block the email
address.
• A spammer may
have infiltrated your email provider's host and compromised your account. You
should notify your email provider.
• A spammer has
gained access to your email. Unfortunately, the only thing you can do to
prevent further SPAM is to close your account and create a new email address.
36. Which of the following spam filtering issues stops valid messages from being delivered?
Answers:
• false negatives
• false positives
37. Which is most likely something that could be considered strange account activity and may require further scrutiny on an e-commerce site?
Answers:
• A user logs in
from another computer than the last login
• Orders from several user accounts are being sent to the same
physical address
• A user changes
their email
• A user changes their
more than once password
38. What is disposable email addressing?
Answers:
• Someone who
creates an email for the sole purpose of sending out spam
• A practice in
which a spammer sends out mass emails from a single email account, but never
logs into that account again.
• A practice in which you set a unique email address for
sender/recipient communication. Disposable email addresses typically forward to
one or more real email mailboxes where the owner can receive and read messages
without revealing their true email.
• Email addresses
that are not rea, but they appear on the from section of an email. They are
often used to help protect spammer's from being traced.
39. What is ransomware?
Answers:
• Software that
steals files from your computer and is used by blackmailers
• A nickname for
types of spyware that require a password on boot
• A software that hijacks your computer and asks you to pay in
order for it to be removed
• Viruses that
infect files and won't let you open them unless you know a certain pass code
40. When a spammer forges the sender's address and enters an invalid receiver, which of the following settings will cause the receiving mail server to create backscatter?
Answers:
• Reject messages
• Drop messages
• Bounce messages
41. In order to help prevent spam, a honeypot performs which of the following functions?
Answers:
• traps suspected
spam messages
• delivers
suspected spam messages more slowly
• acts as a desirable mail server in order to lure spammers
• routes suspected
spam to special enclaves in the system
42. Performing outbound spam filtering does which of the following for an organization?
Answers:
• helps prevent
spam trapping
• helps prevent blacklisting
• helps prevent
whitelisting
43. Which of the following techniques requires posting an email address where only spammers would find it?
Answers:
• Tarpits
• Spam Traps
• Blacklists
44. What is CryptoLocker?
Answers:
• A malware class
which is known for encrypting itself to avoid detection.
• A type of
encrypted Linux file system.
• A module of the
Windows BitLocker encryption system.
• A type of ransomware which encrypts user files and demands
payment for the decryption key.
45. Which of the following reduces spam by rejecting mail from a specific ip addresses?
Answers:
• URL Blacklisting
• POP3
Blacklisting
• DNS Blacklisting
• IMAP
Blacklisting
46. Antivirus programs hash files on a computer in order to detect which of the following activities?
Answers:
• File size
changes
• File permissions
changes
• File content changes
47. How can delivering mail as text instead of html help prevent spam?
Answers:
• text is easier
to analyze for spammer information
• text mail prevents web bugs from alerting spammer that the
message was opened
• mail servers
won't accept html messages if they are in text mode
48. Which type of analysis is an antivirus program performing when it observes a file's activities in a sandbox or decompiles a file and analyzes its instructions?
Answers:
• Signature
Analysis
• Performance
Analysis
• Heuristic Analysis
49. Which of the following characteristics classify a mail message as spam?
Answers:
• it is solicited
and contains advertising
• it is unsolicited
and contains advertising
• it is solicited
and indiscriminately addressed
• it is unsolicited and indiscriminately addressed
50. Antivirus signatures are constructed using with of the following?
Answers:
• Cyclic
Redundancy Checks
• Hashes
• Encryption
Algorithms
• Random Number
Generators
51. What is email spoofing?
Answers:
• Sending an email
through multiple accounts in order to make it difficult to trace back the
original email's sender address or origin
• Copying or
forwarding emails and then editing their To and From to make it appear that the
email was originally sent to or from someone else
• When someone
sends an email that appears to look like a legitimate, but it is actually not
and is being used to obtain personal or important information.
• When someone forges or makes it appear that a email being
sent is from a particular sender when it really is being sent by someone else.
52. Which of the following tools would NOT be useful in figuring out what spyware or viruses could be installed on a client's computer?
Answers:
• Malware Bytes
• HitmanPro
• WireShark
• HighjackThis
53. Which of the following is true of macro viruses?
Answers:
• They are written
in low-level languages to avoid detection
• They depend on applications to propagate
• They depend on
the operating system to propagate
• They are larger
than traditional viruses
54. In a compromised system, which of the following provides the safest way to analyze it?
Answers:
• Resident
Antivirus Program
• Live CD/DVD
• Live USB
55. Which of the following can prevent virus infections?
Answers:
• Implementing a
firewall
• Implementing an
intrusion detection system
• Patching programs and the operating system
56. Which of the following differentiates a virus from a worm?
Answers:
• a worm requires
user interaction to infect a machine
• a worm can
infect multiple machines
• a virus requires user interaction to infect a machine
• a virus can only
infect a single machine
57. Which of the following spam filtering techniques statistically analyzes mail?
Answers:
• Keyword
Filtering
• Community
Filtering
• Bayesian Filtering
•
Challenge-Response Filtering
58. On a WordPress site, which is the default service/tool to prevent spammers from posting comments?
Answers:
• SpamAssassin
• MailWasher Pro
• Akismet
• Website
Inspector
59. Which of the following best describes a distributed antivirus tool that consist of a scanning client and a corresponding web service?
Answers:
• Internet OS
Antivirus
• Client/Server
Antivirus
• Cloud Antivirus
• Web Antivirus
60. Firewalls help to prevent which of the following malware from propagating?
Answers:
• Encrypted
viruses
• Worms
• Polymorphic
viruses
• Trojan viruses
61. What is the difference between a worm and virus?
Answers:
• Unlike a virus, a worm does not need to attach itself to a
program to spread.
• A worm does not
replicate itself like a virus does, but rather moves from computer to computer
• A virus infects
files, while a worm eats them
• A worm is a
virus created for a very specific purpose
62. Most spyware is used to...
Answers:
• steal sensitive
information on a computer in order to blackmail you
• slow down
computers for the sole purpose of maliciousness
• create a backdoor
• track a user's movement on the web or display pop-up ads
63. Polymorphic viruses randomly generate which of the following items before infecting a new file?
Answers:
• mutation engine
• decryption
routine
• virus body
64. A virus can hide itself from an antivirus software by doing which of the following?
Answers:
• compressing
itself in a zip file
• appending itself
to an executable file
• intercepting operating system read and write requests
• replacing an
executable file with its payload
65. Which of the following is true of a trojan virus?
Answers:
• a trojan inserts
a copy of itself into another program
• a Trojan doesn't self-replicate
• a trojan
reproduces by infecting other files
66. Which of the following sites use disposable email addressing?
Answers:
• All of these
• Amazon
• Walmart
• Craigslist
67. When using greylist filtering, a message will be considered legitimate if it does which of the following?
Answers:
• sends its
message without html markup
• is not a
multipart message
• contains a
sender and subject line
• sends its message more than once
68. Which is not an example of a real life virus or worm discovered during the time period of 1980 to 2013?
Answers:
• Elk Cloner
• iRiot
• The Michelangelo
Virus
• The ILOVEYOU
Worm
69. In order to help prevent spam, a tarpit performs which of the following functions?
Answers:
• acts as a
desirable mail server in order to lure spammers
• delivers suspected spam messages more slowly
• traps suspected
spam messages
• routes suspected
spam to special enclaves in the system
No comments:
Post a Comment