Вы находитесь на странице: 1из 18

1/11/2019 Malware Quiz - ExamCompass

ExamCompass
CompTIA Practice Exams

(/./)

6 95

Malware Quiz

 Harmful programs used to disrupt computer operation, gather sensitive information, or gain access to
private computer systems are commonly referred to as:

   Adware

   Malware ( Your answer)

   Computer viruses

   Spyware

 You correctly answered this question.

 Which of the following answers refer to the characteristic features of an advertising-supported


software? (Select 2 answers)

   Unsolicited or undesired electronic messages

   Advertisements embedded in a computer application ( Missed)

   A type of software commonly referred to as malware

   Malicious program that sends copies of itself to other computers on the network

   A type of software commonly referred to as adware ( Your answer)

 Your answer to this question is incorrect.

 A computer program containing malicious segment that attaches itself to an application program or
other executable component is called:

   Adware

   Spam

   Virus ( Your answer)


https://www.examcompass.com/malware-quiz 1/18
1/11/2019 Malware Quiz - ExamCompass
   Flash cookie

 You correctly answered this question.

 In computer security, the part of malware code responsible for performing malicious action is referred
to as:

   Payload ( Your answer)

   Frame

   Exploit

   Logic bomb

 You correctly answered this question.

 Malicious software collecting information about users without their knowledge/consent is known as:

   Trojan

   Backdoor

   Virus

   Adware

   Spyware ( Your answer)

 You correctly answered this question.

 The term "companion virus" refers to an older type of computer virus which doesn't alter files and
works by creating infected companion file with the exact same name as the legitimate program, but
with different file extension. The virus takes advantage of the fact that in the old MS-DOS command-line
interface executables can be run by providing only the file name which facilitates the execution of
infected code by an unaware user.

   True ( Your answer)

   False

 You correctly answered this question.

https://www.examcompass.com/malware-quiz 2/18
1/11/2019 Malware Quiz - ExamCompass
 Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful
program is known as:

   Adware

   Backdoor

   Trojan ( Your answer)

   Spyware

 You correctly answered this question.

 Which type of files pose the greatest risk related to the distribution of malware?

   .png

   .exe ( Your answer)

   .txt

   .pdf

 You correctly answered this question.

 In computer security, an automatic download performed without the user's consent (and often without
any notice) aimed at installing malware or potentially unwanted programs is known as a drive-by
download.

   True ( Your answer)

   False

 You correctly answered this question.

 A collection of zombies is known as:

   Extranet

   Intranet

   Botnet ( Your answer)

   Ethernet
https://www.examcompass.com/malware-quiz 3/18
1/11/2019 Malware Quiz - ExamCompass
 You correctly answered this question.

 Which of the following answers lists an example of spyware?

   Keylogger ( Your answer)

   Vulnerability scanner

   Screen lock

   Packet sniffer

   Protocol analyzer

 You correctly answered this question.

 The iframe tag can be used for loading malicious code (often in the form of JavaScript applet) onto an
otherwise trusted page.

   True ( Missed)

   False

 Your answer to this question is incorrect.

 A computer virus that actively attacks an antivirus program in an effort to prevent detection is called:

   Phage virus

   Armored virus ( Your answer)

   Macro virus

   Retrovirus ( Missed)

 Your answer to this question is incorrect.

 A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-
level access to a computer or computer network is known as:

   Trojan

   Rootkit ( Your answer)


https://www.examcompass.com/malware-quiz 4/18
1/11/2019 Malware Quiz - ExamCompass
   Armored virus

   Backdoor

 You correctly answered this question.

 Which of the following answers refers to an undocumented (and often legitimate) way of gaining
access to a program, online service or an entire computer system?

   Spyware

   Trojan horse

   Rootkit

   Backdoor ( Your answer)

 You correctly answered this question.

 The process of isolation of files and applications suspected of containing malware in order to prevent
further execution and potential harm to the user's system is known as:

   Safe mode

   Quarantine ( Your answer)

   Protected mode

   Blacklisting

 You correctly answered this question.

 In its more intrusive form, adware can track browsing habits in order to serve better targeted ads
based on user interests.

   True ( Your answer)

   False

 You correctly answered this question.

https://www.examcompass.com/malware-quiz 5/18
1/11/2019 Malware Quiz - ExamCompass
 Computer code or command that takes advantage of a design flaw in software is commonly referred
to as:

   Bug

   Backdoor

   Exploit ( Your answer)

   Rootkit

 You correctly answered this question.

 Which of the following answers refer(s) to the ways of delivering online advertising content utilized by
adware? (Select all that apply)

   Replay attack

   Pop-up ( Missed)

   Bluesnarfing

   Pop-under ( Missed)

   Stegangraphy

 Your answer to this question is incorrect.

 A computer that has been compromised by a virus or Trojan horse that puts it under the remote control
of an online hijacker is called:

   Honeypot

   Zombie ( Your answer)

   Logic bomb

   Adware

 You correctly answered this question.

 Which of the computer virus types listed below deletes or corrupts contents of the target host file
instead of attaching itself to the file?
https://www.examcompass.com/malware-quiz 6/18
1/11/2019 Malware Quiz - ExamCompass
   Armored virus

   Retrovirus

   Companion virus

   Phage virus ( Your answer)

 You correctly answered this question.

 Web browser extensions (a.k.a. plugins, or add-ons) are downloadable components that extend the
browser's functionality by enabling interactive features of web pages. Downloading and installing
browser extensions can be risky, because some of them may contain malicious code and in disguise of
a legitimate program introduce malware to the system.

   True ( Your answer)

   False

 You correctly answered this question.

 Which of the following terms describes a method employed by many computer antivirus programs
designed to detect previously unknown types of malware?

   Heuristics ( Missed)

   Steganography

   Quarantine ( Your answer)

   Signature-based detection

 Your answer to this question is incorrect.

 A group of computers running malicious software under control of a hacker is known as:

   Honeynet

   Botnet ( Your answer)

   Ethernet

   Honeypot

https://www.examcompass.com/malware-quiz 7/18
1/11/2019 Malware Quiz - ExamCompass
 You correctly answered this question.

 Which of the following answers best describes a type of mobile software that while running in disguise
of a legitimate program tries to harm user devices or personal data?

   Phage virus

   Computer worm

   Malicious app ( Missed)

   Trojan horse ( Your answer)

   Spyware

 Your answer to this question is incorrect.

 An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an
example of a false negative error.

   True

   False ( Your answer)

 You correctly answered this question.

 Which of the application types listed below fall(s) into the category of anti-malware solutions? (Select
all that apply)

   Anti-spyware ( Your answer)

   Kerberos

   Antivirus ( Your answer)

   GNU Privacy Guard (GPG)

   Anti-spam ( Your answer)

   Pop-up blocker ( Your answer)

 You correctly answered this question.

https://www.examcompass.com/malware-quiz 8/18
1/11/2019 Malware Quiz - ExamCompass
 Which of the following components pose a risk of unintended downloading and execution of malware
on a PC? (Select 2 answers)

   Tracking cookies

   Browser plugins ( Your answer)

   ActiveX controls ( Your answer)

   Polymorphic malware

   Keylogger

 You correctly answered this question.

 A type of rogue application that exploits dialup connections by making unauthorized telephone calls is
known as:

   Dialer ( Missed)

   Keylogger

   Dropper

   Trojan ( Your answer)

 Your answer to this question is incorrect.

 Which of the following answers refers to an anti-antivirus exploit?

   Retrovirus ( Missed)

   Phage virus

   Polimorphic virus ( Your answer)

   Armored virus

 Your answer to this question is incorrect.

 A malware-infected networked host under remote control of a hacker is commonly referred to as:

   Trojan

   Worm
https://www.examcompass.com/malware-quiz 9/18
1/11/2019 Malware Quiz - ExamCompass
   Bot ( Your answer)

   Honeypot

 You correctly answered this question.

 Which of the following answers refers to a technique used by certain types of malware to cause an
error in a program and make it easier to run malicious code?

   Bluejacking

   Buffer overflow ( Your answer)

   Malicious add-on

   Input validation

   Pentest

 You correctly answered this question.

 A software that automatically plays, displays, or downloads advertisements to a computer is known


as:

   Spyware

   Malware

   Adware ( Your answer)

   Shareware

 You correctly answered this question.

 A type of virus that takes advantage of various mechanisms specifically designed to make tracing,
disassembling and reverse engineering its code more difficult is known as:

   Phage virus

   Armored virus ( Missed)

   Retrovirus ( Your answer)

   Companion virus
https://www.examcompass.com/malware-quiz 10/18
1/11/2019 Malware Quiz - ExamCompass
   Macro virus

 Your answer to this question is incorrect.

 Which of the following acronyms refers to a network security solution combining the functionality of a
firewall with additional safeguards such as URL filtering, content inspection, or malware inspection?

   MTU

   MGCP

   UTM ( Missed)

   PGP

 Your answer to this question is incorrect.

 Data files containing detection and/or remediation code that antivirus or antispyware products use to
identify malicious code are known as:

   Repositories

   Signature files ( Your answer)

   Macros

   Security logs

 You correctly answered this question.

 Malicious code activated by a specific event is known as:

   Trojan horse

   Logic bomb ( Your answer)

   Spyware

   Armored virus

 You correctly answered this question.

https://www.examcompass.com/malware-quiz 11/18
1/11/2019 Malware Quiz - ExamCompass
 Which of the following answers refers to the process by which a computer virus makes copies of itself
to carry out subsequent infections?

   Polymorphism

   Pharming

   Replication ( Your answer)

   Phishing

 You correctly answered this question.

 A standalone malicious computer program that replicates itself over a computer network is known as:

   Phage virus

   Computer worm ( Your answer)

   Macro virus

   Trojan horse

 You correctly answered this question.

 A type of Trojan designed to transfer other malware onto a PC via Internet connection is known as:

   Dialer

   Dropper

   Downloader ( Missed)

   Proxy

 Your answer to this question is incorrect.

 Which security measure is in place when a client is denied access to the network due to outdated
antivirus software?

   NAC ( Missed)

   DMZ

   VLAN
https://www.examcompass.com/malware-quiz 12/18
1/11/2019 Malware Quiz - ExamCompass
   NAT

 Your answer to this question is incorrect.

 A type of Trojan designed to install other malware files onto a PC without the need for an active
Internet connection is known as:

   Proxy

   Downloader

   Dropper ( Missed)

   Dialer

 Your answer to this question is incorrect.

 Malware that restricts access to a computer system by encrypting files or locking the entire system
down until the user performs requested action is known as:

   Grayware

   Adware

   Ransomware ( Your answer)

   Spyware

 You correctly answered this question.

 Entry fields of web forms lacking input validation are vulnerable to what kind of attacks?

   Spear phishing

   Watering hole attack

   Tailgating

   SQL injection ( Your answer)

 You correctly answered this question.

https://www.examcompass.com/malware-quiz 13/18
1/11/2019 Malware Quiz - ExamCompass
 Which type of computer virus takes advantage of the capability for creating and embedding simple
scripts in popular office applications?

   Phage virus

   Macro virus ( Your answer)

   Retrovirus

   Armored virus

 You correctly answered this question.

 The process by which malicious software changes its underlying code in order to avoid detection is
known as polymorphism.

   True ( Your answer)

   False

 You correctly answered this question.

 An antivirus software can be kept up to date through: (Select all that apply)

   Audit trails

   Engine updates ( Your answer)

   Virus signature updates ( Your answer)

   OS updates ( Your answer)

 Your answer to this question is incorrect.

 What is the function of Windows Defender software?

   Allowing and blocking applications through Windows Firewall

   Management of User Account Control (UAC) settings

   Reviewing the computer's status and resolving issues

   Protection against viruses, spyware and other potentially unwanted software ( Your answer)

https://www.examcompass.com/malware-quiz 14/18
1/11/2019 Malware Quiz - ExamCompass
 You correctly answered this question.

 Which of the following terms refers to unwanted applications or files that are not classified as
malware, but can worsen the performance of computers and pose security risk?

   Grayware ( Your answer)

   Shareware

   Ransomware

   Freeware

 You correctly answered this question.

 Which of the terms listed below refers to a computer security vulnerability allowing attackers to insert
malicious code into a trusted website?

   Replay attack

   Buffer overflow

   URL hijacking

   Cross-site scripting ( Your answer)

   Xmas attack

 You correctly answered this question.

 Which type of Trojan enables unauthorized remote access to a compromised system?

   pcap

   RAT ( Your answer)

   MaaS

   pfSense

 You correctly answered this question.

 Which of the following terms refers to an example of a crypto-malware?


https://www.examcompass.com/malware-quiz 15/18
1/11/2019 Malware Quiz - ExamCompass
   Backdoor

   Ransomware ( Your answer)

   Keylogger

   Rootkit

 You correctly answered this question.

Your Final Report

Total marks 59

Total Questions 52

Questions correctly answered 38

Success ratio 73.08%

Marks secured 45

Percentage secured 76.27%

CompTIA Security+ Exam - Expert Preparation from Sybex


CompTIA Approved Content. Video Lectures, Test Bank, Practice OPEN
Exams, & More e cientlearning.com

Security+

CompTIA Security+ Certification Exam SY0-501 Practice Tests


Security+ Practice Test 1 (/comptia-security-plus- Security+ Practice Test 13 (/comptia-security-plus-
practice-test-1-exam-sy0-501) practice-test-13-exam-sy0-501)
Security+ Practice Test 2 (/comptia-security-plus- Security+ Practice Test 14 (/comptia-security-plus-
practice-test-2-exam-sy0-501) practice-test-14-exam-sy0-501)
Security+ Practice Test 3 (/comptia-security-plus- Security+ Practice Test 15 (/comptia-security-plus-
practice-test-3-exam-sy0-501) practice-test-15-exam-sy0-501)
Security+ Practice Test 4 (/comptia-security-plus- Security+ Practice Test 16 (/comptia-security-plus-
practice-test-4-exam-sy0-501) practice-test-16-exam-sy0-501)
Security+ Practice Test 5 (/comptia-security-plus- Security+ Practice Test 17 (/comptia-security-plus-
practice-test-5-exam-sy0-501) practice-test-17-exam-sy0-501)
Security+ Practice Test 6 (/comptia-security-plus- Security+ Practice Test 18 (/comptia-security-plus-
practice-test-6-exam-sy0-501) practice-test-18-exam-sy0-501)

https://www.examcompass.com/malware-quiz 16/18
1/11/2019 Malware Quiz - ExamCompass
Security+ Practice Test 7 (/comptia-security-plus- Security+ Practice Test 19 (/comptia-security-plus-
practice-test-7-exam-sy0-501) practice-test-19-exam-sy0-501)
Security+ Practice Test 8 (/comptia-security-plus- Security+ Practice Test 20 (/comptia-security-plus-
practice-test-8-exam-sy0-501) practice-test-20-exam-sy0-501)
Security+ Practice Test 9 (/comptia-security-plus- Security+ Practice Test 21 (/comptia-security-plus-
practice-test-9-exam-sy0-501) practice-test-21-exam-sy0-501)
Security+ Practice Test 10 (/comptia-security-plus- Security+ Practice Test 22 (/comptia-security-plus-
practice-test-10-exam-sy0-501) practice-test-22-exam-sy0-501)
Security+ Practice Test 11 (/comptia-security-plus- Security+ Practice Test 23 (/comptia-security-plus-
practice-test-11-exam-sy0-501) practice-test-23-exam-sy0-501)
Security+ Practice Test 12 (/comptia-security-plus- Security+ Practice Test 24 (/comptia-security-plus-
practice-test-12-exam-sy0-501) practice-test-24-exam-sy0-501)

CompTIA Security+ Certification SY0-501 Practice Tests by Exam Topic

Malware Quiz (/comptia-security-plus-certification-exam-sy0-501-malware-quiz)


Social Engineering Quiz (/comptia-security-plus-certification-exam-sy0-501-social-engineering-quiz)
Common Vulnerabilities Quiz (/comptia-security-plus-certification-exam-sy0-501-common-vulnerabilities-
quiz)
Command-Line Utilities Quiz (/comptia-security-plus-certification-exam-sy0-501-command-line-utilities-
quiz)
Secure Network Protocols Quiz (/comptia-security-plus-certification-exam-sy0-501-secure-network-
protocols-quiz)
TCP and UDP Ports Quiz (/comptia-security-plus-certification-exam-sy0-501-tcp-and-udp-ports-quiz)
Cryptography Quiz (/comptia-security-plus-certification-exam-sy0-501-cryptography-quiz)
Wireless Security Quiz (/comptia-security-plus-certification-exam-sy0-501-wireless-security-quiz)
Public Key Infrastructure (PKI) Quiz (/comptia-security-plus-certification-exam-sy0-501-public-key-
infrastructure-quiz)

Exam Glossaries

Malware Glossary (/malware-glossary)

CompTIA Security+ SY0-501 Exam Objectives (https://certification.comptia.org/docs/default-source/exam-


objectives/comptia-security-sy0-501-exam-objectives.pdf)

https://www.examcompass.com/malware-quiz 17/18
1/11/2019 Malware Quiz - ExamCompass

Site Map (/site-m ap)

Privacy Policy (/privacy-policy)

Term s & Conditions (/term s-and-conditions)

Back to top (https://w w w .exam com pass.com /m alw are-quiz#top)

https://www.examcompass.com/malware-quiz 18/18

Вам также может понравиться