Search Header Logo

IT SECURITY Assignment 1

Authored by Martha Lulli Hweka Blessed

Computers

University

Used 4+ times

IT SECURITY Assignment 1
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

36 questions

Show all answers

1.

OPEN ENDED QUESTION

3 mins • 1 pt

surname, name and student number

Evaluate responses using AI:

OFF

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are characteristics of DYNAMIC Malware Analysis? (Choose all that apply)

Executing Malware in an Isolated environment to determine its behavior

Reading a Malware code to determine its type and behavior

Examining the behavior of Malware in an infected System

Using online tools to determine a Malware's type and capability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A colleague has been urging you to download a new animated screensaver he has been using for several weeks. While he is showing you the program, the cursor on his screen moves on its own and a command prompt window opens and quickly closes. You can’t tell what if anything was displayed in that command prompt window. Your colleague says, “It’s been doing that for a while, but it’s no big deal.” Based on what you’ve seen, you suspect the animated screensaver is really what type of malware?

A worm

A trojan

Ransomware

Spyware

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Users at your organization are complaining about slow systems. Examining several of them, you see that CPU utilization is extremely high and a process called “btmine” is running on each of the affected systems. You also notice each of the affected systems is communicating with an IP address outside your country on UDP port 43232. If you disconnect the network connections on the affected systems, the CPU utilization drops significantly. Based on what you’ve observed, you suspect these systems are infected with what type of malware?

Rainbow tables

Crypto-malware

Dictionary

Hybrid attack

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Qual malware infecta o computador de forma silenciosa, disfarçado como um programa comum abrindo as portas para invasão.

Trojan

Keylogger

Worm

Spyware

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

While port-scanning your network for unauthorized systems, you notice one of your file servers has TCP port 31337 open. When you connect to the port with the security tool netcat, you see a prompt that reads, “Enter password for access:”. Your server may be infected with what type of malware?

PUP

Fileless virus

Backdoor

Man in the middle attack

7.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Select three (3) application security methods:

Configuration Baseline

Application Hardening

Security Baseline

Patch Management

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?