1.
Alison discovers that a system under her control has been infected with malware, which is using a key logger to report user keystrokes to a third party. What information security property is this malware attacking?
Correct Answer
D. Confidentiality
Explanation
The malware in this scenario is attacking the property of confidentiality. By using a key logger to report user keystrokes to a third party, the malware is compromising the privacy and confidentiality of the user's information. It is unauthorizedly accessing and disclosing sensitive data, violating the principle of confidentiality in information security.
2.
What is NOT a typical sign of virus activity on a system?
Correct Answer
C. Unexpected power failures
Explanation
Unexpected power failures are not typically a sign of virus activity on a system. Power failures are usually caused by issues with the electrical supply or hardware malfunctions, rather than by viruses. Virus activity on a system is more commonly indicated by symptoms such as slow performance, frequent crashes, unusual error messages, unauthorized access to files, and unexpected network traffic.
3.
Which type of virus targets computer hardware and software startup functions?
Correct Answer
B. System infector
Explanation
A system infector virus is a type of virus that specifically targets computer hardware and software startup functions. This means that it infects the system files and processes that are responsible for starting up the computer and running the operating system. Once infected, the virus can cause various issues such as system crashes, slow performance, and unauthorized access to the system.
4.
What file type is least likely to be impacted by a file infector virus?
Correct Answer
B. .docx
Explanation
File infector viruses typically target executable files such as .exe and .com files, as they can easily inject their malicious code into these types of files. On the other hand, .docx files are Microsoft Word documents that do not contain executable code, making them less likely to be impacted by file infector viruses. However, it is important to note that no file type is completely immune to viruses, and it is always recommended to have antivirus software and practice safe browsing habits.
5.
Adam discovers a virus on his system that is using encryption to modify itself. The virus escapes detection by signature-based antivirus software. What type of virus has he discovered?
Correct Answer
A. PolymorpHic virus
Explanation
Adam has discovered a polymorphic virus. This type of virus is able to modify itself by using encryption, making it difficult for signature-based antivirus software to detect. Polymorphic viruses change their code structure each time they replicate, making it challenging to identify and remove them.
6.
What program, released in 2013, is an example of ransomware?
Correct Answer
B. Crypt0locker
Explanation
Crypt0locker, released in 2013, is an example of ransomware. Ransomware is a type of malicious software that encrypts a victim's files and demands a ransom in exchange for the decryption key. Crypt0locker gained notoriety for its ability to encrypt files on a victim's computer and network drives, making them inaccessible until the ransom was paid.
7.
Breanne's system was infected by malicious code after she installed an innocent-looking solitaire game that she downloaded from the Internet. What type of malware did she likely encounter?
Correct Answer
C. Trojan horse
Explanation
Breanne likely encountered a Trojan horse malware after installing the innocent-looking solitaire game. Trojan horse malware disguises itself as legitimate software, tricking users into downloading and installing it. Once installed, it can perform malicious activities such as stealing personal information, damaging files, or giving unauthorized access to the attacker. Unlike worms or viruses, Trojan horses do not replicate themselves but rely on social engineering techniques to deceive users. A logic bomb is a type of malware that is triggered by a specific event or condition, which is not applicable in this scenario.
8.
Bob is developing a web application that depends upon a database backend. What type of attack could a malicious individual use to send commands through his web application to the database?
Correct Answer
C. SQL injection
Explanation
A malicious individual could use SQL injection to send commands through Bob's web application to the database. SQL injection is a type of attack where an attacker inserts malicious SQL code into a query, allowing them to manipulate the database and potentially gain unauthorized access or retrieve sensitive information. By exploiting vulnerabilities in the web application's input validation, the attacker can bypass security measures and execute arbitrary SQL commands.
9.
Larry recently viewed an auction listing on a website. As a result, his computer executed code that popped up a window that asked for his password. What type of attack has Larry likely encountered?
Correct Answer
D. Cross-site scripting (XSS)
Explanation
Larry has likely encountered a cross-site scripting (XSS) attack. XSS attacks occur when an attacker injects malicious code into a trusted website, which then executes on the victim's computer. In this case, Larry's computer executed code that popped up a window asking for his password after viewing an auction listing on a website. This is a typical behavior of an XSS attack, where the injected code can manipulate the website's content and interact with the user's browser.
10.
Yolanda would like to prevent attackers from using her network as a relay point for a smurf attack. What protocol should she block?
Correct Answer
C. ICMP
Explanation
Yolanda should block the ICMP protocol to prevent attackers from using her network as a relay point for a smurf attack. ICMP (Internet Control Message Protocol) is commonly exploited in smurf attacks, where attackers send a large number of ICMP echo request packets to IP broadcast addresses, causing a flood of responses to overwhelm the victim's network. By blocking ICMP, Yolanda can prevent her network from being used as a relay point for such attacks.