Malwares Exams
Malwares Exams
A. Digital signature
B. Backdoor
C. Buffer overflow
D. Adware
A. Social engineering
B. Backdoor
C. Ransomware
D. Trojan horse
A. Keylogger
B. Patch management
C. Spyware
D. Ethical worm
4. Made famous by the Maze gang in 2019, the name-and-shame tactic is most
commonly used by cybercriminal groups in which of the following attacks?
A. Port scan
B. Logic bomb
C. Distributed denial of service (DDoS)
D. Ransomware
A. Malicious link
B. Botnet
C. Worm
D. Hybrid virus
A. Rootkit
B. Penetration test
C. Virus
D. Logic bomb
7. A hybrid virus infects both files and system sectors and may incorporate
which of the following?
11. Fill in the blank: Phishing, spear phishing, vishing, scareware and watering
hole attacks are all types of ______.
A. Probes
B. Insider threats
C. Social engineering
D. Ransomware
A. Bitcoin
B. Cryptominer
C. Monero
D. Graceful degradation
14. Which of the following attacks uses a botnet to overwhelm a server or other
network resource with fraudulent traffic, thus triggering the system to deny
access to legitimate users?
A. DDoS
B. DoS
C. IoT
D. Command and control
Section B: Essay(30)