
Chapter 3: Malicious Code

Quiz
•
Computers
•
University
•
Easy
Fhaa Lossx
Used 4+ times
FREE Resource
20 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Ryan wants to prevent logic bombs created by insider threats from impacting his organization. What technique will most effectively limit the likelihood of logic bombs being put in place?
Deploying antivirus software
Using a code review process
Deploying endpoint detection and response (EDR) software
Disabling autorun for USB drives
Answer explanation
Key Phrase: "Prevent logic bombs"
Explanation:
Correct Answer (B): A code review process will identify and prevent logic bombs by scrutinizing code before deployment.
Why others are wrong:
A: Antivirus software is not effective against logic bombs embedded in code.
C: EDR tools focus on detecting active malware, but not code-level threats like logic bombs.
D: Disabling autorun for USB drives won't stop insider threats or logic bombs in code.
2.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Yasmine believes that her organization may be dealing with an advanced rootkit and wants to write IoC definitions for it. Which of the following is not likely to be a useful IoC for a rootkit?
File hashes
Command and control domains
Pop-ups demanding a ransom
Behavior-based identifiers
Answer explanation
Key Phrase: "Not useful IoC for a rootkit"
Explanation:
Correct Answer (C): Rootkits are designed to remain stealthy, so pop-up ransom demands would be an anomaly and not useful as an IoC for a rootkit.
Why others are wrong:
A: File hashes are useful for identifying files associated with rootkits.
B: Command and control domains are crucial for tracking rootkit behavior.
D: Behavior-based identifiers help detect rootkit activity, even if it's hidden.
3.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Nathan works at a school and notices that one of his staff appears to have logged in and changed grades for a single student to higher grades, even in classes that staff member is not responsible for. When asked, the staff member says that they did not perform the action. Which of the following is the most likely way that a student could have gotten access to the staff member's password?
A keylogger
A rootkit
Spyware
A logic bomb
Answer explanation
Key Phrase: "Most likely way to get access to password"
Explanation:
Correct Answer (A): A keylogger would capture the staff member's login credentials, allowing the student to access the system without the staff member's knowledge.
Why others are wrong:
B: A rootkit is used to maintain access, not to capture passwords.
C: Spyware collects data but not specifically passwords or keystrokes.
D: A logic bomb is an event-triggered malware, not relevant to password theft.
4.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Amanda notices traffic between her systems and a known malicious host on TCP port 6667. What type of traffic is she most likely detecting?
Command and control
Spyware
A worm
A hijacked web browser
Answer explanation
Key Phrase: "Malicious traffic on TCP 6667"
Explanation:
Correct Answer (A): TCP port 6667 is commonly associated with IRC (Internet Relay Chat), which is often used for botnet command and control.
Why others are wrong:
B: Spyware typically uses HTTP/HTTPS for data exfiltration.
C: Worms spread via vulnerabilities and don’t use specific ports like this.
D: A hijacked web browser would typically use standard web ports (80/443).
5.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
Mike discovers that attackers have left software that allows them to have remote access to systems on a computer in his company's network. How should he describe or classify this malware?
A worm
Crypto malware
A Trojan
A backdoor
Answer explanation
Key Phrase: "Remote access software"
Explanation:
Correct Answer (D): A backdoor provides unauthorized remote access to a system, often installed by attackers for later use.
Why others are wrong:
A: A worm is a self-replicating malware that doesn’t necessarily offer remote access.
B: Crypto malware encrypts data, not used for remote access.
C: A Trojan may contain a backdoor, but "backdoor" is the more specific term.
6.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What is the primary impact of bloatware?
Consuming resources
Logging keystrokes
Providing information about users and devices to third parties
Allowing unauthorized remote access
Answer explanation
Key Phrase: "Impact of bloatware"
Explanation:
Correct Answer (A): Bloatware uses system resources such as disk space, CPU, and memory without providing any meaningful function.
Why others are wrong:
B: Bloatware doesn’t typically log keystrokes.
C: Bloatware doesn't necessarily gather user information for third parties.
D: Bloatware doesn’t provide remote access.
7.
MULTIPLE CHOICE QUESTION
15 mins • 1 pt
What type of malware is used to gather information about a user's browsing habits and system?
A Trojan
Bloatware
Spyware
A rootkit
Answer explanation
Key Phrase: "Gathering browsing habits"
Explanation:
Correct Answer (C): Spyware is designed to monitor and collect information about users’ browsing habits, search history, and other personal data.
Why others are wrong:
A: A Trojan appears to be benign but contains malicious code.
B: Bloatware is typically pre-installed software that isn’t malicious.
D: A rootkit hides malicious software and is not designed to gather user data.
Create a free account and access millions of resources
Similar Resources on Wayground
20 questions
System and network support and management

Quiz
•
11th Grade - Professi...
15 questions
UIT 2221 MALWARE (COPTPA)

Quiz
•
University
16 questions
Computer Security Risk

Quiz
•
11th Grade - University
20 questions
cyber awareness

Quiz
•
University
24 questions
Revision for Chapter 3

Quiz
•
University
15 questions
CAMBRIDGE - A Level - IT - Network Security

Quiz
•
12th Grade - Professi...
18 questions
Cyber EOP - Anti-Virus/Malware & Removal By Mr. B

Quiz
•
12th Grade - University
15 questions
CiberSeguridad Malware

Quiz
•
University
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade