• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

FREE AND STUDY GAMES ABOUT TESTOUT ITSEC C7.1

Class notes Jan 11, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

PDF Download

FREE AND STUDY GAMES ABOUT TESTOUT ITSEC C7.1

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -69 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation

Question 1: Michelangelo

Answer:

The 1991 Michelangelo virus was designed to infect MS-DOS systems and remain dormant until March 6, the birthday of Renaissance artist Michelangelo. The virus infects the master boot record of a hard drive. Once a system becomes infected, any floppy disk inserted into the system becomes immediately infected, as well.Question 2: To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware.What could you do to help prevent this?

Answer:

Configure the software to automatically download the virus definition files as soon as they become available

Question 3: Logic Bomb

Answer:

Malware designed to execute only under predefined conditions that lays dormant until the predefined condition is met.

As such, the malware will actually lay dormant until those conditions occur, then it's going to execute

? Uses a trigger activity such as a specific date and time, the launching of a specific program, or the processing of a specific type of activity ? Does not self-replicate ? Is also known as an asynchronous attack

Question 4: Ransomware

Answer:

Malware that denies access to a computer system until the user pays a ransom.

Question 5: Zombie

Answer:

A computer that is infected with malware that allows remote software updates and control by a command and control center called a zombie master.? also known as a bot ? Commonly uses Internet Relay Chat (IRC) channels (also known as chat rooms) to communicate with the zombie master.? used to aid spammers.? Is used to commit click fraud. The internet uses a form of advertising called pay-per-click, ? Is used for performing denial-of-service attacks.

Question 6: Adware

Answer:

Malware that monitors actions that denote personal preferences and sends pop-ups and ads that match those preferences.

? Is usually passive ? Is privacy-invasive software ? Is installed on your machine by visiting a particular website or running an application ? Is usually more annoying than harmful

Question 7: Wrapper

Answer:

is a program that is used legitimately, but has a Trojan attached to it that will infiltrate whichever computer runs the wrapper software.

Question 8: How to defend against a Trojan

Answer:

Install anti-malware on the system to detect a Trojan.

Question 9: Black hat hackers

Answer:

are people who unethically test or exploit the vulnerabilities of computer systems.

Question 10: Which of the following best describes spyware?

Answer:

It monitors the actions you take on your machine and sends the information back to its originating source.

Question 11: How do you discover that you have a Trojan or you are a zombie

Answer:

you can examine your computer's firewall log to see if it's been acting as a zombie. In the log, you should see the out-bound traffic from the zombie going through the firewall to the zombie master.Question 12: What is the primary distinguishing characteristic between a worm and a logic bomb?

Answer:

Self-replication

The primary distinguishing characteristic between a worm and a logic bomb is self-replication.

Worms are designed to replicate and spread as quickly and as broadly as possible.

Logic bombs do not self-replicate. They are designed for a specific single system or type of system.Once planted on a system, it remains there until it is triggered.

Question 13: asynchronous attack

Answer:

Same as a logic bomb

Question 14: White hat hackers

Answer:

are ethical people who have the ability to find vulnerabilities in computer systems.

Question 15: armored virus

Answer:

is designed to make itself difficult to detect or analyze by covering itself with protective code.makes itself difficult to detect by covering itself with a type of protective code.Question 16: You have installed anti-virus software on the computers on your network. You update the definition and engine files and configure the software to update those files every day.What else should you do to protect your systems from malware? (Select two.) -Disable UAC -Schedule regular full system scans -Enable chassis intrusion detection -Enable account lockout -Educate users about malware

Answer:

-Schedule regular full system scans -Educate users about malware

You should schedule regular full system scans to look for any malware. In addition, educate users about the dangers of downloading software and the importance of anti-malware protections.Question 17: You have heard about a new malware program that presents itself to users as a virus scanner. When users run the software, it installs itself as a hidden program that has administrator access to various operating system components. The program then tracks system activity and allows an attacker to remotely gain administrator access to the computer.Which of the following terms best describes this software?

Answer:

Rootkit

This program is an example of a rootkit. A rootkit is a set of programs that allow attackers to maintain permanent, administrator-level, and hidden access to a computer. Rootkits require administrator access for installation and typically gain this access using a Trojan horse approach--masquerading as a legitimate program to entice users to install the software.

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

This document provided in-depth analysis, which enhanced my understanding. Absolutely excellent!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Class notes
Added: Jan 11, 2026
Description:

PDF Download FREE AND STUDY GAMES ABOUT TESTOUT ITSEC C7.1 Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -69 Questions and Answers -format set of multip...

Unlock Now
$ 1.00