M6 Practice Quiz

Question 1

  1. Which of the following best describes a Trojan?

    Options:

    • A program that replicates itself and spreads to other computers
    • A program that logs keystrokes without the user's knowledge
    • A software that displays unwanted ads without the user's permission
    • A malicious program disguised as legitimate software

    Overall explanation:

    • A Trojan is a malicious program disguised as legitimate software.
    • A worm is a malicious program that replicates itself and spread to other computers on the network.
    • Spyware or adware is a type of software that displays unwanted ads with the user's permission.
    • A keylogger is a malicious program that logs every keystroke types by a user without their knowledge or consent.

    Tags: Trojan

Question 2

  1. Which of the following is designed to give cybercriminals access to a system that can carry out malicious tasks, such as distributed denial-of-service (DDoS) attacks or to spread malware, without the user's knowledge?

    Options:

    • Bloatware
    • Ransomware
    • Keylogger
    • Zombie

    Overall explanation:

    • A zombie is a compromised computer or device that has been hijacked by a hacker or malware to perform tasks, usually as part of a larger network of compromised devices known as a botnet.
    • Ransomware is malicious software that encrypts the victim's files or locks them out of their device, then demands a ransom payment to restore access or decrypt the files.
    • A keylogger is a malicious program that logs every keystroke types by a user without their knowledge or consent.
    • Bloatware is unwanted software that comes pre-installed on a new computer or device, typically by the manufacturer, which often consumes system resources and takes up storage space.

    Tags: Zombies and Botnets

Question 3

  1. Which of the following is a type of malware that operates behind the scenes to deliver ads or track user activity?

    Options:

    • Spyware
    • Logic Bomb
    • Virus
    • Worm

    Overall explanation:

    • Spyware or adware is a type of software that displays unwanted ads with the user's permission.
    • A worm is a malicious program that replicates itself and spread to other computers on the network.
    • A virus is a malicious program that attaches itself to legitimate software or files and spreads from one device to another and often causes harm or unexpected behaviors to occur.
    • A logic bomb is a type of malicious code that activates and executes its payload when specific conditions or triggers are met within a system.

    Tags: Spyware and Bloatware

Question 4

  1. Which of the following BEST describes what a rootkit is used for?

    Options:

    • Hide malware activities and maintain privileged access to a system
    • Encrypt user files and demand payment for decryption
    • Replicate themselves across networks without human intervention
    • Log the user's keystrokes to steal their credentials

    Overall explanation:

    • A rootkit is used to hide malware activities while maintain privileged access to the system.
    • Ransomware is used to encrypt a users files and then demand payment from them to receive the decryption key.
    • A keylogger is used to log the user's keystrokes in order to steal their credentials.
    • A worm is a malicious program that can replicate itself across networks without human intervention.

    Tags: Rootkits

Question 5

  1. Which of these is a common indication of a malware attack?
    Options:

    • Reduced number of account lockouts
    • Appearance of unknown software on the user's system
    • Decreased resource consumption
    • Fewer logs than usual during peak hours

    Overall explanation:

    • It is important that cybersecurity professionals can recognize the nine primary indications of malware attacks:
      • increased account lockouts,
      • concurrent session utilization,
      • increases in blocked content,
      • impossible travel,
      • increased resource consumption,
      • resource inaccessibility,
      • out-of-cycle logging,
      • missing logs (or fewer logs than usual during peak hours),
      • documented attacks.

    Tags: Indications of Malware Attacks