Which of the following malware types may require user interaction, does not hide itself, and is commonly ident
Which of the following malware types may require user interaction, does not hide itself, and is commonly
identified by marketing pop-ups based on browsing habits?
Which of the following malware categories BEST describes this program?
A program has been discovered that infects a critical Windows system executable and stays dormant in
memory. When a Windows mobile phone is connected to the host, the program infects the phone’s boot
loader and continues to target additional Windows PCs or phones. Which of the following malware
categories BEST describes this program?
Which of the following is MOST likely to be contained in the download?
A user casually browsing the Internet is redirected to a warez site where a number of pop-ups appear.
After clicking on a pop-up to complete a survey, a drive-by download occurs. Which of the following is
MOST likely to be contained in the download?
Which of the following malware types typically allows an attacker to monitor a user’s computer, is character
Which of the following malware types typically allows an attacker to monitor a user’s computer, is
characterized by a drive-by download, and requires no user interaction?
Which of the following BEST describes this type of malware?
Sara, a user, downloads a keygen to install pirated software. After running the keygen, system
performance is extremely slow and numerous antivirus alerts are displayed. Which of the following BEST
describes this type of malware?
Which of the following has MOST likely been installed on the server?
During a server audit, a security administrator does not notice abnormal activity. However, a network
security analyst notices connections to unauthorized ports from outside the corporate network. Using
specialized tools, the network security analyst also notices hidden processes running. Which of the
following has MOST likely been installed on the server?
The administrator should be looking for the presence of a/an:
A trojan was recently discovered on a server. There are now concerns that there has been a security
breach that allows unauthorized people to access data. The administrator should be looking for the
presence of a/an:
which of the following?
Two programmers write a new secure application for the human resources department to store personal
identifiable information. The programmers make the application available to themselves using an
uncommon port along with an ID and password only they know. This is an example of which of the
following?
Which of the following should the CIO be concerned with?
The Chief Information Officer (CIO) receives an anonymous threatening message that says “beware of the
1st of the year”. The CIO suspects the message may be from a former disgruntled employee planning an
attack.Which of the following should the CIO be concerned with?
Which of the following is this an example of?
Ann, a software developer, has installed some code to reactivate her account one week after her account
has been disabled. Which of the following is this an example of? (Select TWO).