0% found this document useful (0 votes)
41 views4 pages

Malwares Exams

First semester examination for malware course

Uploaded by

Jiji Slearnd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views4 pages

Malwares Exams

First semester examination for malware course

Uploaded by

Jiji Slearnd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Section A: MCQ

1. Which of the following, dubbed Sunburst, was used by nation-state actors to


bypass SolarWinds' security mechanisms and gain access to its system?

A. Digital signature
B. Backdoor
C. Buffer overflow
D. Adware

2. Which of the following malicious programs, appearing to be legitimate, is


commonly used to target banking and payment systems to access confidential
information?

A. Social engineering
B. Backdoor
C. Ransomware
D. Trojan horse

3. Choose the correct malware term that describes a controversial program


designed to propagate across networks for the purpose of distributing security
patches for known vulnerabilities.

A. Keylogger
B. Patch management
C. Spyware
D. Ethical worm

4. Made famous by the Maze gang in 2019, the name-and-shame tactic is most
commonly used by cybercriminal groups in which of the following attacks?

A. Port scan
B. Logic bomb
C. Distributed denial of service (DDoS)
D. Ransomware

5. Which of the following describes a self-replicating malware that spreads by


duplicating itself in order to infect other devices without user interaction?

A. Malicious link
B. Botnet
C. Worm
D. Hybrid virus

6. Once installed, which collection of software tools is used to gain remote


access to and control over a computer or system?

A. Rootkit
B. Penetration test
C. Virus
D. Logic bomb
7. A hybrid virus infects both files and system sectors and may incorporate
which of the following?

A. Characteristics of macro viruses


B. Characteristics of file infectors
C. Characteristics of system infectors
D. Any combination of the above

8. Which of the following is not true of a logic bomb?

A. Lies dormant, typically undetected, until trigger occurs


B. Its level of destruction is always the same
C. Commonly orchestrated by malicious insiders to sabotage the
organization
D. Logic bomb triggers are categorized as either positive or negative
9. Fill in the blanks: ______ is used legitimately in free versions of applications
to display advertisements while a program is running but can be classified as
______ if the code records users' information or browsing habits without their
consent and authorization.

A. Social engineering; malvertising


B. Adware; spyware
C. Shareware; malware
D. Adware; ransomware
10. Which of the following is not true of a keylogger?

A. This surveillance technology is sometimes hardware-based.


B. It monitors and records keystrokes typed on a keyboard.
C. It can require physical access to the target's device for
installation.
D. Task managers are enough to detect it.

11. Fill in the blank: Phishing, spear phishing, vishing, scareware and watering
hole attacks are all types of ______.

A. Probes
B. Insider threats
C. Social engineering
D. Ransomware

12. Which of the following is not an indicator of a DoS attack?

A. Degradation of network performance


B. Specific website is unavailable
C. Lower than usual volume of spam email
D. Inability to access any website
13. Choose the term that describes the dangerous malware that takes over a
victim's machine and abuses compute resources to mine digital currency and
transfer it to the criminal's digital wallet.

A. Bitcoin
B. Cryptominer
C. Monero
D. Graceful degradation
14. Which of the following attacks uses a botnet to overwhelm a server or other
network resource with fraudulent traffic, thus triggering the system to deny
access to legitimate users?

A. DDoS
B. DoS
C. IoT
D. Command and control

Section B: Essay(30)

What is a computer exploit?

What is exposure management?

What is malware? Prevention, detection and how attacks work

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy