Which of the following is not a type of malware? a.
a hacker.
b. botnets.
c. a worm.
d. a virus.
Option 'A' is correct
Hacker
Hacker is not a type of Malware.
Malware refers to software that is Inherently hostile, intrusive, or annoying in its operation.
Which of the following is not a type of malware? a. a hacker. b. botnets. c....
QUESTION 13 Malware safeguards include all the following, EXCEPT A. scan your computer frequently with anti-malware or anti-virus software B. encrypt all stored data and communications to secure them from threats. C. update the malware definitions for your anti-malware and anti-virus software frequently D. open e-mail attachments and links only from known sources as they are major sources for malware.
8. Explain the terms: a. hacker, b. criminal hacker (cracker), c. script bunnies, and d. insiders.
Note: Questions can have multiple valid answers, hence select all choices that apply. 1. What security feature ensures that only trusted and approved parties can view a file? a) Availability b) Integrity e) Confidentiality d) Authorization e) None of the above 2. An organization wanting to achieve improved security via diversity should: a) Limit access to information to certain individuals and systems b) Perform extensive types of penetration testing of its networks and systems c) Purchase products from multiple different...
secuirty 1. When digitally signing a document, which key do you use? A: Symmetric key B: Public key C: Private Key D: Your house key 2. Which of the following protocols uses encryption? A: FTP B: Telnet C: SSH D: SMTP 3. What happens when rm is used to delete a file? A: Creates a new hardlink to the file B: Only removes the file pointer C: Removes file pointer and only writes over data D: Removes file pointer and...
story Bookmarks People Tab Window Help 72% х GA is someone who attaX M Sent Mail-simonsamal27 X Dashboard X 11 Adobe: C courses/67553/quizzes/75344/take 3 Chap, 14 6. Any Search Question 2 2 pts is someone who attacks a computer system or network for financial gain, O hacker O cracker O malicious insider cybercriminal Question 3 2 pts A is a form of malware that fools its victims into thinking that it is useful software from a legitimate source worm ransomware...
You are reviewing computer security issues with a new technician in your department. You are currently discussing computer malware. What sort of malicious software sends a copy of what the computer user types to a remote location to harvest passwords and other private information? A. A virus B. A worm C. A keystroke logger D. A password cracker
3. Which of the following is not a category of malware? Worms Trojans Viruses None of the above 4. Which of the following malwares exploits the vulnerability in the Windows OS to infect a host? Conficker Stuxnet Mydoom None of the above
A company is experiencing an increasing number of systems that are locking upon Windows startup. The security analyst clones a machine, enters into safe mode, and discovers a file in the startup process that runs Wstart.bat. @echo off asdhbawdhbasdhbawdhb start notepad. exe start notepad. exe start calculator. exe start calculator. exe goto asdhbawdhbasdhbawdhb Given the file contents and the system's issues, which of the following types of malware is present? A. Rootkit B. Logic bomb C. Worm D. Virus A...
21) A malware infection spread to numerous workstations within the marketing department. The workstations were quarantined and replaced with newer machines Which of the following represents a FINAL step in the eradication of the malware? A) The workstations should be isolated from the network. B) The workstations should be donated for reuse. C) The workstations should be reimaged D) The workstations should be patched and scanned.
7. Which of the following disease is caused by a virus a) Herpes b) AIDS c) Gonorrhea d) Chlamydia (e) Both a and b 8. All the following are true about cystitis, except a. a bladder infection b. It is common among otherwise healthy women c. It is caused in 80-90 % cases by Serratia species d. It is common nosocomial infection 9. Which of the following is true about HIV? a. The virus can attack a variety of cells,...