PDF Download
FREE AND STUDY GAMES ABOUT TESTOUT ITSEC C7.1
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -69 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation
Question 1: Michelangelo
Answer:
The 1991 Michelangelo virus was designed to infect MS-DOS systems and remain dormant until March 6, the birthday of Renaissance artist Michelangelo. The virus infects the master boot record of a hard drive. Once a system becomes infected, any floppy disk inserted into the system becomes immediately infected, as well.Question 2: To tightly control the anti-malware settings on your computer, you elect to update the signature file manually. Even though you vigilantly update the signature file, the machine becomes infected with a new type of malware.What could you do to help prevent this?
Answer:
Configure the software to automatically download the virus definition files as soon as they become available
Question 3: Logic Bomb
Answer:
Malware designed to execute only under predefined conditions that lays dormant until the predefined condition is met.
As such, the malware will actually lay dormant until those conditions occur, then it's going to execute
? Uses a trigger activity such as a specific date and time, the launching of a specific program, or the processing of a specific type of activity ? Does not self-replicate ? Is also known as an asynchronous attack
Question 4: Ransomware
Answer:
Malware that denies access to a computer system until the user pays a ransom.
Question 5: Zombie
Answer:
A computer that is infected with malware that allows remote software updates and control by a command and control center called a zombie master.? also known as a bot ? Commonly uses Internet Relay Chat (IRC) channels (also known as chat rooms) to communicate with the zombie master.? used to aid spammers.? Is used to commit click fraud. The internet uses a form of advertising called pay-per-click, ? Is used for performing denial-of-service attacks.
Question 6: Adware
Answer:
Malware that monitors actions that denote personal preferences and sends pop-ups and ads that match those preferences.
? Is usually passive ? Is privacy-invasive software ? Is installed on your machine by visiting a particular website or running an application ? Is usually more annoying than harmful
Question 7: Wrapper
Answer:
is a program that is used legitimately, but has a Trojan attached to it that will infiltrate whichever computer runs the wrapper software.
Question 8: How to defend against a Trojan
Answer:
Install anti-malware on the system to detect a Trojan.
Question 9: Black hat hackers
Answer:
are people who unethically test or exploit the vulnerabilities of computer systems.
Question 10: Which of the following best describes spyware?
Answer:
It monitors the actions you take on your machine and sends the information back to its originating source.
Question 11: How do you discover that you have a Trojan or you are a zombie
Answer:
you can examine your computer's firewall log to see if it's been acting as a zombie. In the log, you should see the out-bound traffic from the zombie going through the firewall to the zombie master.Question 12: What is the primary distinguishing characteristic between a worm and a logic bomb?
Answer:
Self-replication
The primary distinguishing characteristic between a worm and a logic bomb is self-replication.
Worms are designed to replicate and spread as quickly and as broadly as possible.
Logic bombs do not self-replicate. They are designed for a specific single system or type of system.Once planted on a system, it remains there until it is triggered.
Question 13: asynchronous attack
Answer:
Same as a logic bomb
Question 14: White hat hackers
Answer:
are ethical people who have the ability to find vulnerabilities in computer systems.
Question 15: armored virus
Answer:
is designed to make itself difficult to detect or analyze by covering itself with protective code.makes itself difficult to detect by covering itself with a type of protective code.Question 16: You have installed anti-virus software on the computers on your network. You update the definition and engine files and configure the software to update those files every day.What else should you do to protect your systems from malware? (Select two.) -Disable UAC -Schedule regular full system scans -Enable chassis intrusion detection -Enable account lockout -Educate users about malware
Answer:
-Schedule regular full system scans -Educate users about malware
You should schedule regular full system scans to look for any malware. In addition, educate users about the dangers of downloading software and the importance of anti-malware protections.Question 17: You have heard about a new malware program that presents itself to users as a virus scanner. When users run the software, it installs itself as a hidden program that has administrator access to various operating system components. The program then tracks system activity and allows an attacker to remotely gain administrator access to the computer.Which of the following terms best describes this software?
Answer:
Rootkit
This program is an example of a rootkit. A rootkit is a set of programs that allow attackers to maintain permanent, administrator-level, and hidden access to a computer. Rootkits require administrator access for installation and typically gain this access using a Trojan horse approach--masquerading as a legitimate program to entice users to install the software.