1.
Harmful programs used to disrupt computer operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:
Correct Answer
B. Malware
Explanation
Malware refers to harmful programs that are designed to disrupt computer operations, gather sensitive information, or gain unauthorized access to computer systems. It is a broad term that encompasses various types of malicious software, including viruses, worms, Trojans, and more. Unlike adware, which primarily displays unwanted advertisements, or spyware, which secretly monitors a user's activities, malware has a more malicious intent and can cause significant harm to computer systems and data. Ransomware, on the other hand, specifically encrypts a user's files and demands a ransom for their release. Therefore, the correct answer is malware.
2.
Which of the terms listed below refers to an example of a crypto-malware?
Correct Answer
B. Ransomware
Explanation
Ransomware is a type of crypto-malware that encrypts a victim's files and demands a ransom in exchange for the decryption key. It is designed to extort money from individuals or organizations by preventing them from accessing their own data. Ransomware has become increasingly prevalent in recent years, causing significant damage and financial loss to victims. Unlike backdoors, which are hidden entry points into a system used for unauthorized access, ransomware focuses on encrypting data to hold it hostage for monetary gain.
3.
Malware that restricts access to a computer system by encrypting files or locking the entire system down until the user performs requested action is known as:
Correct Answer
B. Ransomware
Explanation
Ransomware is a type of malware that limits access to a computer system by encrypting files or locking the entire system until the user fulfills certain demands. This form of malware typically demands a ransom payment in exchange for restoring access to the system or decrypting the files. Unlike grayware, which refers to potentially unwanted software that may not be malicious, ransomware specifically focuses on extorting money or valuable resources from the user.
4.
A standalone malicious computer program that typically propagates itself over a computer network to adversely affect system resources and network bandwidth is called:
Correct Answer
A. Worm
Explanation
A worm is a type of malicious computer program that can spread itself over a computer network without any assistance from the user. Unlike viruses, worms do not need to attach themselves to a host file or program. Instead, they exploit vulnerabilities in network protocols to replicate and spread across multiple computers, often causing damage to system resources and consuming network bandwidth. Therefore, the correct answer for this question is "Worm".
5.
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network is known as:
Correct Answer
A. Rootkit
Explanation
A rootkit is a collection of software tools used by a hacker to mask their intrusion and gain unauthorized access to a computer or computer network at an administrator level. It allows the hacker to maintain control over the compromised system while remaining undetected by security measures. Unlike a backdoor, which is a specific method of bypassing authentication, a rootkit is a broader term encompassing various tools and techniques used for stealthy and persistent access.
6.
Which of the following answers lists an example of spyware?
Correct Answer
B. Keylogger
Explanation
A keylogger is a type of spyware that records every keystroke made on a computer, including passwords, credit card numbers, and other sensitive information. It is typically installed without the user's knowledge and can be used by hackers to steal personal information. Keyloggers can be extremely dangerous as they can silently monitor and collect data, making it a clear example of spyware.
7.
What is adware?
Correct Answer
C. Software that displays advertisements
Explanation
Adware refers to software that displays advertisements. This type of software is designed to deliver advertisements to users' devices, often in the form of pop-up ads or banners. Adware can be installed on a device knowingly or unknowingly, and it is commonly bundled with free software or downloaded from unreliable sources. While adware itself may not be inherently malicious, it can be intrusive and disruptive to the user experience.
8.
Malicious software collecting information about users without their knowledge/consent is known as:
Correct Answer
D. Spyware
Explanation
Spyware is a type of malicious software that secretly collects information about users without their knowledge or consent. It is designed to gather personal data such as browsing habits, keystrokes, and login credentials, which can then be used for various malicious purposes such as identity theft or unauthorized access to sensitive information. Unlike other options listed, such as crypto-malware, ransomware, and adware, spyware specifically focuses on covertly gathering user information rather than encrypting files, demanding ransom, or displaying unwanted advertisements.
9.
A malware-infected networked host under remote control of a hacker is commonly referred to as:
Correct Answer
C. Bot
Explanation
A malware-infected networked host under remote control of a hacker is commonly referred to as a "Bot." Bots are malicious software programs that can be used by hackers to gain unauthorized access to a networked host and control it remotely. These infected hosts are often used in large numbers to form a botnet, which can be used for various malicious activities such as launching DDoS attacks, spreading spam, or stealing sensitive information.
10.
Which type of Trojan enables unauthorized remote access to a compromised system?
Correct Answer
D. RAT
Explanation
A Remote Access Trojan (RAT) is a type of Trojan that allows unauthorized remote access to a compromised system. This means that once the system is infected with a RAT, an attacker can gain control over the system from a remote location, without the user's knowledge or consent. This can be used for various malicious purposes, such as stealing sensitive information, spying on the user's activities, or using the compromised system as a launching point for further attacks. Therefore, RATs pose a significant security risk and are commonly used by hackers to gain unauthorized access to systems.