Chapter 3: Malicious Code

Chapter 3: Malicious Code

University

20 Qs

quiz-placeholder

Similar activities

Computer Security Risk

Computer Security Risk

11th Grade - University

16 Qs

Intruders Attacks on Network and Computers

Intruders Attacks on Network and Computers

University

15 Qs

CISD113 - 3

CISD113 - 3

University

15 Qs

cyber awareness

cyber awareness

University

20 Qs

Revision for Chapter 3

Revision for Chapter 3

University

24 Qs

WJEC ICT  - Chapter 3 -  Malware

WJEC ICT - Chapter 3 - Malware

10th Grade - University

19 Qs

OS2-rsst-quiz in midterm

OS2-rsst-quiz in midterm

University

20 Qs

L7: Cybersecurity Threats Quiz

L7: Cybersecurity Threats Quiz

University

15 Qs

Chapter 3: Malicious Code

Chapter 3: Malicious Code

Assessment

Quiz

Computers

University

Easy

Created by

Fhaa Lossx

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Ryan wants to prevent logic bombs created by insider threats from impacting his organization. What technique will most effectively limit the likelihood of logic bombs being put in place?

Deploying antivirus software

Using a code review process

Deploying endpoint detection and response (EDR) software

Disabling autorun for USB drives

Answer explanation

Key Phrase: "Prevent logic bombs"

Explanation:
Correct Answer (B): A code review process will identify and prevent logic bombs by scrutinizing code before deployment.
Why others are wrong:
A: Antivirus software is not effective against logic bombs embedded in code.
C: EDR tools focus on detecting active malware, but not code-level threats like logic bombs.
D: Disabling autorun for USB drives won't stop insider threats or logic bombs in code.

2.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Yasmine believes that her organization may be dealing with an advanced rootkit and wants to write IoC definitions for it. Which of the following is not likely to be a useful IoC for a rootkit?

File hashes

Command and control domains

Pop-ups demanding a ransom

Behavior-based identifiers

Answer explanation

Key Phrase: "Not useful IoC for a rootkit"

Explanation:
Correct Answer (C): Rootkits are designed to remain stealthy, so pop-up ransom demands would be an anomaly and not useful as an IoC for a rootkit.
Why others are wrong:
A: File hashes are useful for identifying files associated with rootkits.
B: Command and control domains are crucial for tracking rootkit behavior.
D: Behavior-based identifiers help detect rootkit activity, even if it's hidden.

3.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Nathan works at a school and notices that one of his staff appears to have logged in and changed grades for a single student to higher grades, even in classes that staff member is not responsible for. When asked, the staff member says that they did not perform the action. Which of the following is the most likely way that a student could have gotten access to the staff member's password?

A keylogger

A rootkit

Spyware

A logic bomb

Answer explanation

Key Phrase: "Most likely way to get access to password"

Explanation:
Correct Answer (A): A keylogger would capture the staff member's login credentials, allowing the student to access the system without the staff member's knowledge.
Why others are wrong:
B: A rootkit is used to maintain access, not to capture passwords.
C: Spyware collects data but not specifically passwords or keystrokes.
D: A logic bomb is an event-triggered malware, not relevant to password theft.

4.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Amanda notices traffic between her systems and a known malicious host on TCP port 6667. What type of traffic is she most likely detecting?

Command and control

Spyware

A worm

A hijacked web browser

Answer explanation

Key Phrase: "Malicious traffic on TCP 6667"

Explanation:
Correct Answer (A): TCP port 6667 is commonly associated with IRC (Internet Relay Chat), which is often used for botnet command and control.
Why others are wrong:
B: Spyware typically uses HTTP/HTTPS for data exfiltration.
C: Worms spread via vulnerabilities and don’t use specific ports like this.
D: A hijacked web browser would typically use standard web ports (80/443).

5.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

Mike discovers that attackers have left software that allows them to have remote access to systems on a computer in his company's network. How should he describe or classify this malware?

A worm

Crypto malware

A Trojan

A backdoor

Answer explanation

Key Phrase: "Remote access software"

Explanation:
Correct Answer (D): A backdoor provides unauthorized remote access to a system, often installed by attackers for later use.
Why others are wrong:
A: A worm is a self-replicating malware that doesn’t necessarily offer remote access.
B: Crypto malware encrypts data, not used for remote access.
C: A Trojan may contain a backdoor, but "backdoor" is the more specific term.

6.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What is the primary impact of bloatware?

Consuming resources

Logging keystrokes

Providing information about users and devices to third parties

Allowing unauthorized remote access

Answer explanation

Key Phrase: "Impact of bloatware"

Explanation:
Correct Answer (A): Bloatware uses system resources such as disk space, CPU, and memory without providing any meaningful function.
Why others are wrong:
B: Bloatware doesn’t typically log keystrokes.
C: Bloatware doesn't necessarily gather user information for third parties.
D: Bloatware doesn’t provide remote access.

7.

MULTIPLE CHOICE QUESTION

15 mins • 1 pt

What type of malware is used to gather information about a user's browsing habits and system?

A Trojan

Bloatware

Spyware

A rootkit

Answer explanation

Key Phrase: "Gathering browsing habits"

Explanation:
Correct Answer (C): Spyware is designed to monitor and collect information about users’ browsing habits, search history, and other personal data.
Why others are wrong:
A: A Trojan appears to be benign but contains malicious code.
B: Bloatware is typically pre-installed software that isn’t malicious.
D: A rootkit hides malicious software and is not designed to gather user data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?