1. Which statement(s) defines malware most accurately?
- A) Malware is a form of virus.
- B) Trojans are malware.
- C) Malware covers all malicious software.
- D) Malware only covers spyware.
Show Answer
2. Which is/are a characteristic of a virus?
- A) A virus is malware.
- B) A virus replicates on its own.
- C) A virus replicates with user interaction.
- D) A virus is an item that runs silently.
Show Answer
3. A virus does not do which of the following?
- A) Replicate with user interaction
- B) Change configuration settings
- C) Exploit vulnerabilities
- D) Display pop-ups
Show Answer
4. Which of the following is/are true of a worm?
- A) A worm is malware.
- B) A worm replicates on its own.
- C) A worm replicates with user interaction.
- D) A worm is an item that runs silently.
Show Answer
5. What are worms typically known for?
- A) Rapid replication
- B) Configuration changes
- C) Identity theft
- D) DDoS
Show Answer
6. What command is used to listen to open ports with netstat?
- A) netstat -an
- B) netstat -ports
- C) netstat -n
- D) netstat -s
Show Answer
7. Which utility will tell you in real time which ports are listening or in another state?
- A) Netstat
- B) TCPView
- C) Nmap
- D) Loki
Show Answer
8. Which of the following is not a Trojan?
- A) BO2K
- B) LOKI
- C) Subseven
- D) TCPTROJAN
Show Answer
9. What is not a benefit of hardware keyloggers?
- A) Easy to hide
- B) Difficult to install
- C) Difficult to detect
- D) Difficult to log
Show Answer
10. Which of the following is capable of port redirection?
- A) Netstat
- B) TCPView
- C) Netcat
- D) Loki
Show Answer
11. A Trojan relies on __________ to be activated.
- A) Vulnerabilities
- B) Trickery and deception
- C) Social engineering
- D) Port redirection
Show Answer
12. A Trojan can include which of the following?
- A) RAT
- B) TCP
- C) Nmap
- D) Loki
Show Answer
13. What is a covert channel?
- A) An obvious method of using a system
- B) A defined process in a system
- C) A backdoor
- D) A Trojan on a system
Show Answer
14. An overt channel is __________.
- A) An obvious method of using a system
- B) A defined backdoor process in a system
- C) A backdoor
- D) A Trojan on a system
Show Answer
15. A covert channel or backdoor may be detected using all of the following except __________.
- A) Nmap
- B) Sniffers
- C) An SDK
- D) Netcat
Show Answer
16. A remote access Trojan would be used to do all of the following except __________.
- A) Steal information
- B) Remotely control a system
- C) Sniff traffic
- D) Attack another system
Show Answer
17. A logic bomb has how many parts, typically?
- A) One
- B) Two
- C) Three
- D) Four
Show Answer
18. A logic bomb is activated by which of the following?
- A) Time and date
- B) Vulnerability
- C) Actions
- D) Events
Show Answer
19. A polymorphic virus __________.
- A) Evades detection through backdoors
- B) Evades detection through heuristics
- C) Evades detection through rewriting itself
- D) Evades detection through luck
Show Answer
20. A sparse infector virus __________.
- A) Creates backdoors
- B) Infects data and executables
- C) Infects files selectively
- D) Rewrites itself