
IT SECURITY Assignment 1
Authored by Martha Lulli Hweka Blessed
Computers
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
36 questions
Show all answers
1.
OPEN ENDED QUESTION
3 mins • 1 pt
surname, name and student number
Evaluate responses using AI:
OFF
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What are characteristics of DYNAMIC Malware Analysis? (Choose all that apply)
Executing Malware in an Isolated environment to determine its behavior
Reading a Malware code to determine its type and behavior
Examining the behavior of Malware in an infected System
Using online tools to determine a Malware's type and capability
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A colleague has been urging you to download a new animated screensaver he has been using for several weeks. While he is showing you the program, the cursor on his screen moves on its own and a command prompt window opens and quickly closes. You can’t tell what if anything was displayed in that command prompt window. Your colleague says, “It’s been doing that for a while, but it’s no big deal.” Based on what you’ve seen, you suspect the animated screensaver is really what type of malware?
A worm
A trojan
Ransomware
Spyware
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users at your organization are complaining about slow systems. Examining several of them, you see that CPU utilization is extremely high and a process called “btmine” is running on each of the affected systems. You also notice each of the affected systems is communicating with an IP address outside your country on UDP port 43232. If you disconnect the network connections on the affected systems, the CPU utilization drops significantly. Based on what you’ve observed, you suspect these systems are infected with what type of malware?
Rainbow tables
Crypto-malware
Dictionary
Hybrid attack
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Qual malware infecta o computador de forma silenciosa, disfarçado como um programa comum abrindo as portas para invasão.
Trojan
Keylogger
Worm
Spyware
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
While port-scanning your network for unauthorized systems, you notice one of your file servers has TCP port 31337 open. When you connect to the port with the security tool netcat, you see a prompt that reads, “Enter password for access:”. Your server may be infected with what type of malware?
PUP
Fileless virus
Backdoor
Man in the middle attack
7.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Select three (3) application security methods:
Configuration Baseline
Application Hardening
Security Baseline
Patch Management
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?