Alikid discovers that a mechanism under her control has been infected via malware, which is using a keylogger to report user keystrokes to a third party. What information protection building is this malware attacking?A. IntegrityB. AvailabilityC. AccountingD. Confidentiality
D. Confidentiality: Malicious Code and also ActivityExplanation: Malicious code attacks all three properties of indevelopment defense. In this instance, the keylogger is stealing information, which is a violation of confidentiality.

You are watching: Which type of virus targets computer hardware and software startup functions?


What is NOT a typical authorize of virus task on a system?A. Undefined decrease in accessible disk spaceB. Unintended error messagesC. Unmeant power failuresD. Sudden sluggishness of applications
C. Unsupposed power failures: Evidence of Virus Code ActivitiesExplanation: Unintended power failures are normally a authorize of some kind of hardware problem and are not indicative of virus task on a system.
Which form of virus targets computer system hardware and also software program startup functions?A. Hardware infectorB. System infectorC. File infectorD. File infector
B. System infector: VirusExplanation: There are 3 main kinds of virprovides. System infectors targain computer hardware and software startup features. File infectors strike and also modify executable programs (such as COM, EXE, SYS, and DLL documents in Microsoft Windows). Data infectors attack document papers containing installed macro programming capabilities.
What file kind is leastern most likely to be impacted by a paper infector virus?A. .exeB. .docxC. .comD. .dll
B. .docx: Data (Program) InfectorsExplanation: The .docx file form is leastern likely to be affected by a record infector virus. Data infectors commonly strike program papers via .com or .exe file extensions.
Adam discovers a virus on his system that is utilizing encryption to modify itself. The virus escapes detection by signature-based antivirus software. What kind of virus has he discovered?A. Polymorphic virusB. Stealth virusC. Cross-platform virusD. Multipartite virus
A. Polymorphic virus: Other Virus ClassificationsExplanation: Polymorphic virprovides encompass a sepaprice encryption engine that stores the virus body in encrypted format while duplicating the major body of the virus. The virus exposes just the decryption routine for feasible detection. It embeds the regulate percent of the virus in the decryption program, which seizes regulate of the target mechanism and decrypts the main body of the virus so that it deserve to execute.
What regime, released in 2013, is an example of ransomware?A. BitLockerB. Crypt0L0ckerC. FileVaultD. CryptoVault
B. Crypt0L0cker: RansomwareExplanation: One of the first ransomware programs was Crypt0L0cker, which was released in 2013. With ransomware, the attacker mainly advises the individuals to the constraints and requirements a payment to gain back full access. The demand also for a payment, or ransom, gives this form of malware its name.
Breanne"s system was infected by malicious code after she set up an innocent-looking solitaire game that she downloaded from the Net. What kind of malware did she most likely encounter?A. VirusB. WormC. Trojan horseD. Logic bomb
C. Trojan horse: Trojan HorsesExplanation: Trojans, or Trojan steed programs, are the largest course of malware. A Trojan is any type of routine that masquerades as a helpful program while hiding its malicious intent. The masquerading nature of a Trojan urges individuals to downpack and also run the regime.
Bob is occurring a web application that counts upon a database backend. What type of strike might a malicious individual usage to sfinish regulates through his internet application to the database?A. Cross-website scripting (XSS)B. XML injectionC. SQL injectionD. LDAP injection
C. SQL injection: InjectionExplanation: An SQL code injection attacks applications that depend on data stored in databases. SQL statements are inserted into an input area and are executed by the application. SQL injection attacks permit attackers to disclose and modify information, violate data integrity, or even damage information and manipulate the database server.
Larry newly perceived an auction listing on a webwebsite. As a result, his computer system executed code that popped up a home window that asked for his password. What form of assault has Larry likely encountered?A. SQL injectionB. Command also injectionC. XML injectionD. Cross-site scripting (XSS)
D. Cross-website scripting (XSS): InjectionExplanation: XSS attacks enable attackers to embed client-side scripts into webpperiods that individuals view. When a user views a webpage with a manuscript, the internet internet browser runs the attacking script. These scripts have the right to be supplied to bypass accessibility controls. XSS effects have the right to pose substantial security risks, depending upon just how sensitive the information are on the delicate site.
Yolanda would like to proccasion attackers from making use of her netoccupational as a relay point for a smurf attack. What protocol should she block?A. Hypermessage Transfer Protocol (HTTP)B. Transmission Control Protocol (TCP)C. Net Control Article Protocol (ICMP)D. User Datagram Protocol (UDP)
C. Net Control Article Protocol (ICMP): Smurf AttacksExplanation: In a smurf attack, attackers direct forged ICMP echo research packets to IP broadactors addresses from remote places to geneprice denial of company (DoS) attacks.
The CEO of Kelly"s agency newly dropped victim to an attack. The attackers sent out the CEO an e-mail informing him that his agency was being sued and he needed to watch a subpoena at a court website. When visiting the webwebsite, malicious code was downloaded onto the CEO"s computer system. What kind of attack took place?A. Spear phishingB. PharmingC. AdwareD. Command also injection
A. Spear phishingExplanation: This scenario is a classic example of a spear phishing assault, highly targeted at an individual and consisting of indevelopment about the firm.
Gwen is investigating an strike. An intruder controlled to take over the identity of a user that was legitimately logged in to Gwen"s company"s website by manipulating Hypermessage Transfer Protocol (HTTP) headers. Which kind of strike likely took place?A. Session hijackingB. XML injectionC. Cross-site scriptingD. SQL injection
A. Session hijacking: How Can Attackers Attack Net Applications?Explanation: Session hijacking is an assault in which the attacker intercepts netjob-related messperiods in between a web server and a internet web browser. It extracts one or even more pieces of data, the majority of generally a session ID, and also provides that to interact with the internet server. The attacker pretends to be an authorized user by taking over the authorized user"s session.
What is NOT one of the four major objectives of an attack?A. Denial of availabilityB. Data importC. Documents modificationD. Launch point
B. File import: The Purpose of an AttackExplanation: The four primary functions of an assault are denial of availcapacity, data modification, information export, and also as a launch allude.
What tool might be supplied by an attacker during the reconnaissance phase of an assault to glean information around doprimary registrations?A. WhoisB. Simple Network-related Management Protocol (SNMP)C. PingD. Domain Name System (DNS)
A. Whois: DNS, ICMP, and also Related ToolsExplanation: Whois is a tool that offers information on domain registrations, consisting of the registrar, name servers, and the name of the registering organization
Brian would certainly prefer to conduct a port shave the right to versus his devices to identify exactly how they look from an attacker"s viewpoint. What tool can he use for this purpose?A. PingB. Simple Netjob-related Management Protocol (SNMP) agentC. NmapD. Remote Access Tool (RAT)
Val would choose to limit the websites that her customers visit to those on an approved list of pre-cleared sites. What kind of method is Val advocating?A. BlacklistingB. Context-based screeningC. Packet filteringD. Whitelisting
D. Whitelisting: Staying Ahead of the AttackersExplanation: Whitelisting is preserving a list of trusted sites. All messages and link researches from sites not in the whitelist are ignored. Any website that you wish to usage should be added to your whitelist before relations are enabled.
What ISO protection traditional deserve to help overview the creation of an organization"s security policy?A. 12333B. 17259C. 27002D. 42053
C. 27002: Implementing Effective Software Best PracticesExplanation: Consider implementing an ISO/IEC 27002-compliant defense policy. ISO/IEC 27002 is the many commonly recognized protection standard
What kind of system is deliberately exposed to attackers in an attempt to entice them out?A. HoneypotB. Bastion hostC. Web serverD. Database server
A. HoneypotExplanation: Honeypots are sacrificial hosts and solutions deployed at the edges of a netjob-related to act as bait for potential hacking attacks. Typically, you connumber these devices to appear actual.
What type of malicious software program enables an attacker to remotely regulate a compromised computer?A. WormB. Polymorphic virusC. Remote Access Device (RAT)D. Armored virus
C. Remote Access Device (RAT): Maintaining Access Using a Remote Administration ToolExplanation: RAT is a Trojan that, as soon as executed, allows an attacker to remotely control and keep accessibility to a compromised computer system.

See more: L I Suffered I Learned I Changed In Latin Phrases (Full), Idakoos Give Blood, Latin Dance Hoodie: Clothing


D. Fear: What Motivates Attackers?Explanation: The four main motivations for attackers are money, fame, a desire to impose political beliefs on others, and revenge.
window.nlinux.org<"productClickLinkData"> = <"name":"Chapter 11 Quiz","id":"292451468","price":"","category":"premium content","variant":"examine guide","position":"","brand":"mbarrow4">; QLoad("nlinux.org.productClickLinkData"); return;})}elsewindow.nlinux.org<"productClickLinkData"> = <"name":"Chapter 11 Quiz","id":"292451468","price":"","category":"premium content","variant":"research guide","position":"","brand":"mbarrow4">; QLoad("nlinux.org.productClickLinkData"); return;;home window.area.assign("https://nlinux.org/292451468/chapter-11-quiz-flash-cards/");" id="1-292451468">