M6 Practice Quiz
Question 1
-
Which of the following best describes a Trojan?
Options:
- A program that replicates itself and spreads to other computers
- A program that logs keystrokes without the user's knowledge
- A software that displays unwanted ads without the user's permission
- A malicious program disguised as legitimate software
Overall explanation:
- A Trojan is a malicious program disguised as legitimate software.
- A worm is a malicious program that replicates itself and spread to other computers on the network.
- Spyware or adware is a type of software that displays unwanted ads with the user's permission.
- A keylogger is a malicious program that logs every keystroke types by a user without their knowledge or consent.
Tags: Trojan
Question 2
-
Which of the following is designed to give cybercriminals access to a system that can carry out malicious tasks, such as distributed denial-of-service (DDoS) attacks or to spread malware, without the user's knowledge?
Options:
- Bloatware
- Ransomware
- Keylogger
- Zombie
Overall explanation:
- A zombie is a compromised computer or device that has been hijacked by a hacker or malware to perform tasks, usually as part of a larger network of compromised devices known as a botnet.
- Ransomware is malicious software that encrypts the victim's files or locks them out of their device, then demands a ransom payment to restore access or decrypt the files.
- A keylogger is a malicious program that logs every keystroke types by a user without their knowledge or consent.
- Bloatware is unwanted software that comes pre-installed on a new computer or device, typically by the manufacturer, which often consumes system resources and takes up storage space.
Tags: Zombies and Botnets
Question 3
-
Which of the following is a type of malware that operates behind the scenes to deliver ads or track user activity?
Options:
- Spyware
- Logic Bomb
- Virus
- Worm
Overall explanation:
- Spyware or adware is a type of software that displays unwanted ads with the user's permission.
- A worm is a malicious program that replicates itself and spread to other computers on the network.
- A virus is a malicious program that attaches itself to legitimate software or files and spreads from one device to another and often causes harm or unexpected behaviors to occur.
- A logic bomb is a type of malicious code that activates and executes its payload when specific conditions or triggers are met within a system.
Tags: Spyware and Bloatware
Question 4
-
Which of the following BEST describes what a rootkit is used for?
Options:
- Hide malware activities and maintain privileged access to a system
- Encrypt user files and demand payment for decryption
- Replicate themselves across networks without human intervention
- Log the user's keystrokes to steal their credentials
Overall explanation:
- A rootkit is used to hide malware activities while maintain privileged access to the system.
- Ransomware is used to encrypt a users files and then demand payment from them to receive the decryption key.
- A keylogger is used to log the user's keystrokes in order to steal their credentials.
- A worm is a malicious program that can replicate itself across networks without human intervention.
Tags: Rootkits
Question 5
-
Which of these is a common indication of a malware attack?
Options:- Reduced number of account lockouts
- Appearance of unknown software on the user's system
- Decreased resource consumption
- Fewer logs than usual during peak hours
Overall explanation:
- It is important that cybersecurity professionals can recognize the nine primary indications of malware attacks:
- increased account lockouts,
- concurrent session utilization,
- increases in blocked content,
- impossible travel,
- increased resource consumption,
- resource inaccessibility,
- out-of-cycle logging,
- missing logs (or fewer logs than usual during peak hours),
- documented attacks.