1.
Harmful programs designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Correct Answer
B. Malware
Explanation
Malware refers to harmful programs that are specifically designed to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems. It is a broad term that encompasses various types of malicious software, including viruses, worms, Trojans, and more. Adware, ransomware, and spyware are all specific types of malware, but they do not encompass the entire range of malicious programs. Therefore, the correct answer is malware.
2.
Which of the following answers refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system?
Correct Answer
D. Backdoor
Explanation
A backdoor refers to an undocumented (and often legitimate) way of gaining access to a program, online service, or an entire computer system. Unlike logic bombs, which are malicious code designed to damage or disrupt a system, or Trojan horses, which are disguised as harmless software but actually have malicious intent, a backdoor is typically created by the system administrator or developer for legitimate purposes. It allows authorized individuals to bypass normal authentication procedures and access the system. However, backdoors can also be exploited by hackers or attackers to gain unauthorized access, making them a potential security risk.
3.
Malicious code activated by a specific event is called:
Correct Answer
B. Logic bomb
Explanation
A logic bomb refers to a type of malicious code that is designed to execute a specific action when a predetermined event occurs. Unlike other types of malware, a logic bomb remains dormant until triggered by a specific event, such as a specific date or time, a particular action by the user, or a specific condition being met. Once triggered, the logic bomb can cause various harmful consequences, such as deleting files, stealing data, or disrupting the normal functioning of a system. Therefore, the correct answer for this question is logic bomb.
4.
Which type of Trojan enables unauthorized remote access to a compromised system?
Correct Answer
B. RAT
Explanation
A Remote Access Trojan (RAT) is a type of Trojan that allows unauthorized remote access to a compromised system. This means that once a system is infected with a RAT, an attacker can gain control over the system from a remote location without the user's knowledge or consent. This can lead to various malicious activities, such as stealing sensitive information, monitoring user activities, or even using the compromised system as a launching pad for further attacks.
5.
A malware-infected networked host under the remote control of a hacker is commonly referred to as:
Correct Answer
C. Bot
Explanation
A malware-infected networked host under the remote control of a hacker is commonly referred to as a bot. Bots are malicious software programs that allow hackers to gain unauthorized access and control over infected computers. These infected computers, also known as botnets, can be used to carry out various malicious activities such as launching DDoS attacks, spreading spam, stealing sensitive information, or participating in other cybercriminal activities.
6.
Malicious software collecting information about users without their knowledge/consent is known as:
Correct Answer
D. Spyware
Explanation
Spyware is a type of malicious software that secretly collects information about users without their knowledge or consent. It is designed to gather sensitive data such as passwords, credit card details, and browsing habits. Unlike other options mentioned, such as crypto-malware, adware, and ransomware, spyware specifically focuses on unauthorized data collection. It often infiltrates systems through deceptive means, such as bundled with legitimate software or disguised as a helpful tool, and operates covertly in the background, making it difficult for users to detect.
7.
What is adware?
Correct Answer
C. Software that displays advertisements
Explanation
Adware is a type of software that displays advertisements. It is usually installed on a user's device without their consent and generates ads, often in the form of pop-ups or banners, while the user is browsing the internet or using certain applications. Adware is not inherently malicious, but it can be intrusive and disruptive to the user's experience. It is important for users to be cautious when downloading and installing software to avoid unintentionally installing adware.
8.
Which of the following answers lists an example of spyware?
Correct Answer
A. Keylogger
Explanation
A keylogger is a type of spyware that records keystrokes on a computer without the user's knowledge. It can capture sensitive information such as passwords, credit card numbers, and personal messages. This information is then sent to a remote attacker who can use it for malicious purposes. Therefore, a keylogger is a clear example of spyware as it covertly monitors and steals data from a user's device.
9.
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Correct Answer
B. Rootkit
Explanation
A rootkit is a collection of software tools that allows a hacker to hide their presence on a computer or network, as well as gain unauthorized access at the administrator level. Unlike spyware, which is designed to collect information, or a backdoor, which is a hidden entry point for unauthorized access, a rootkit specifically focuses on masking intrusion and obtaining high-level privileges. A Trojan, on the other hand, is a type of malware that disguises itself as legitimate software but carries out malicious activities. Therefore, the correct answer for this question is rootkit.
10.
A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:
Correct Answer
B. Worm
Explanation
A worm is a type of malicious computer program that can spread itself over a computer network without any user intervention. It can replicate and propagate itself to other computers, causing harm to system resources and consuming network bandwidth. Unlike viruses, worms do not need to attach themselves to a host file or program to spread. They can exploit vulnerabilities in network protocols or operating systems to infect other computers. Therefore, the correct answer for this question is "Worm."