Beruflich Dokumente
Kultur Dokumente
ExamCompass
CompTIA Practice Exams
(/./)
6 95
Malware Quiz
Harmful programs used to disrupt computer operation, gather sensitive information, or gain access to
private computer systems are commonly referred to as:
Adware
Computer viruses
Spyware
Malicious program that sends copies of itself to other computers on the network
A computer program containing malicious segment that attaches itself to an application program or
other executable component is called:
Adware
Spam
In computer security, the part of malware code responsible for performing malicious action is referred
to as:
Frame
Exploit
Logic bomb
Malicious software collecting information about users without their knowledge/consent is known as:
Trojan
Backdoor
Virus
Adware
The term "companion virus" refers to an older type of computer virus which doesn't alter files and
works by creating infected companion file with the exact same name as the legitimate program, but
with different file extension. The virus takes advantage of the fact that in the old MS-DOS command-line
interface executables can be run by providing only the file name which facilitates the execution of
infected code by an unaware user.
False
https://www.examcompass.com/malware-quiz 2/18
1/11/2019 Malware Quiz - ExamCompass
Malicious software performing unwanted and harmful actions in disguise of a legitimate and useful
program is known as:
Adware
Backdoor
Spyware
Which type of files pose the greatest risk related to the distribution of malware?
.png
.txt
In computer security, an automatic download performed without the user's consent (and often without
any notice) aimed at installing malware or potentially unwanted programs is known as a drive-by
download.
False
Extranet
Intranet
Ethernet
https://www.examcompass.com/malware-quiz 3/18
1/11/2019 Malware Quiz - ExamCompass
You correctly answered this question.
Vulnerability scanner
Screen lock
Packet sniffer
Protocol analyzer
The iframe tag can be used for loading malicious code (often in the form of JavaScript applet) onto an
otherwise trusted page.
True ( Missed)
False
A computer virus that actively attacks an antivirus program in an effort to prevent detection is called:
Phage virus
Macro virus
Retrovirus ( Missed)
A collection of software tools used by a hacker in order to mask intrusion and obtain administrator-
level access to a computer or computer network is known as:
Trojan
Backdoor
Which of the following answers refers to an undocumented (and often legitimate) way of gaining
access to a program, online service or an entire computer system?
Spyware
Trojan horse
Rootkit
The process of isolation of files and applications suspected of containing malware in order to prevent
further execution and potential harm to the user's system is known as:
Safe mode
Protected mode
Blacklisting
In its more intrusive form, adware can track browsing habits in order to serve better targeted ads
based on user interests.
False
https://www.examcompass.com/malware-quiz 5/18
1/11/2019 Malware Quiz - ExamCompass
Computer code or command that takes advantage of a design flaw in software is commonly referred
to as:
Bug
Backdoor
Rootkit
Which of the following answers refer(s) to the ways of delivering online advertising content utilized by
adware? (Select all that apply)
Replay attack
Pop-up ( Missed)
Bluesnarfing
Pop-under ( Missed)
Stegangraphy
A computer that has been compromised by a virus or Trojan horse that puts it under the remote control
of an online hijacker is called:
Honeypot
Logic bomb
Adware
Which of the computer virus types listed below deletes or corrupts contents of the target host file
instead of attaching itself to the file?
https://www.examcompass.com/malware-quiz 6/18
1/11/2019 Malware Quiz - ExamCompass
Armored virus
Retrovirus
Companion virus
Web browser extensions (a.k.a. plugins, or add-ons) are downloadable components that extend the
browser's functionality by enabling interactive features of web pages. Downloading and installing
browser extensions can be risky, because some of them may contain malicious code and in disguise of
a legitimate program introduce malware to the system.
False
Which of the following terms describes a method employed by many computer antivirus programs
designed to detect previously unknown types of malware?
Heuristics ( Missed)
Steganography
Signature-based detection
A group of computers running malicious software under control of a hacker is known as:
Honeynet
Ethernet
Honeypot
https://www.examcompass.com/malware-quiz 7/18
1/11/2019 Malware Quiz - ExamCompass
You correctly answered this question.
Which of the following answers best describes a type of mobile software that while running in disguise
of a legitimate program tries to harm user devices or personal data?
Phage virus
Computer worm
Spyware
An antivirus software identifying non-malicious file as a virus due to faulty virus signature file is an
example of a false negative error.
True
Which of the application types listed below fall(s) into the category of anti-malware solutions? (Select
all that apply)
Kerberos
https://www.examcompass.com/malware-quiz 8/18
1/11/2019 Malware Quiz - ExamCompass
Which of the following components pose a risk of unintended downloading and execution of malware
on a PC? (Select 2 answers)
Tracking cookies
Polymorphic malware
Keylogger
A type of rogue application that exploits dialup connections by making unauthorized telephone calls is
known as:
Dialer ( Missed)
Keylogger
Dropper
Retrovirus ( Missed)
Phage virus
Armored virus
A malware-infected networked host under remote control of a hacker is commonly referred to as:
Trojan
Worm
https://www.examcompass.com/malware-quiz 9/18
1/11/2019 Malware Quiz - ExamCompass
Bot ( Your answer)
Honeypot
Which of the following answers refers to a technique used by certain types of malware to cause an
error in a program and make it easier to run malicious code?
Bluejacking
Malicious add-on
Input validation
Pentest
Spyware
Malware
Shareware
A type of virus that takes advantage of various mechanisms specifically designed to make tracing,
disassembling and reverse engineering its code more difficult is known as:
Phage virus
Companion virus
https://www.examcompass.com/malware-quiz 10/18
1/11/2019 Malware Quiz - ExamCompass
Macro virus
Which of the following acronyms refers to a network security solution combining the functionality of a
firewall with additional safeguards such as URL filtering, content inspection, or malware inspection?
MTU
MGCP
UTM ( Missed)
PGP
Data files containing detection and/or remediation code that antivirus or antispyware products use to
identify malicious code are known as:
Repositories
Macros
Security logs
Trojan horse
Spyware
Armored virus
https://www.examcompass.com/malware-quiz 11/18
1/11/2019 Malware Quiz - ExamCompass
Which of the following answers refers to the process by which a computer virus makes copies of itself
to carry out subsequent infections?
Polymorphism
Pharming
Phishing
A standalone malicious computer program that replicates itself over a computer network is known as:
Phage virus
Macro virus
Trojan horse
A type of Trojan designed to transfer other malware onto a PC via Internet connection is known as:
Dialer
Dropper
Downloader ( Missed)
Proxy
Which security measure is in place when a client is denied access to the network due to outdated
antivirus software?
NAC ( Missed)
DMZ
VLAN
https://www.examcompass.com/malware-quiz 12/18
1/11/2019 Malware Quiz - ExamCompass
NAT
A type of Trojan designed to install other malware files onto a PC without the need for an active
Internet connection is known as:
Proxy
Downloader
Dropper ( Missed)
Dialer
Malware that restricts access to a computer system by encrypting files or locking the entire system
down until the user performs requested action is known as:
Grayware
Adware
Spyware
Entry fields of web forms lacking input validation are vulnerable to what kind of attacks?
Spear phishing
Tailgating
https://www.examcompass.com/malware-quiz 13/18
1/11/2019 Malware Quiz - ExamCompass
Which type of computer virus takes advantage of the capability for creating and embedding simple
scripts in popular office applications?
Phage virus
Retrovirus
Armored virus
The process by which malicious software changes its underlying code in order to avoid detection is
known as polymorphism.
False
An antivirus software can be kept up to date through: (Select all that apply)
Audit trails
Protection against viruses, spyware and other potentially unwanted software ( Your answer)
https://www.examcompass.com/malware-quiz 14/18
1/11/2019 Malware Quiz - ExamCompass
You correctly answered this question.
Which of the following terms refers to unwanted applications or files that are not classified as
malware, but can worsen the performance of computers and pose security risk?
Shareware
Ransomware
Freeware
Which of the terms listed below refers to a computer security vulnerability allowing attackers to insert
malicious code into a trusted website?
Replay attack
Buffer overflow
URL hijacking
Xmas attack
pcap
MaaS
pfSense
Keylogger
Rootkit
Total marks 59
Total Questions 52
Marks secured 45
Security+
https://www.examcompass.com/malware-quiz 16/18
1/11/2019 Malware Quiz - ExamCompass
Security+ Practice Test 7 (/comptia-security-plus- Security+ Practice Test 19 (/comptia-security-plus-
practice-test-7-exam-sy0-501) practice-test-19-exam-sy0-501)
Security+ Practice Test 8 (/comptia-security-plus- Security+ Practice Test 20 (/comptia-security-plus-
practice-test-8-exam-sy0-501) practice-test-20-exam-sy0-501)
Security+ Practice Test 9 (/comptia-security-plus- Security+ Practice Test 21 (/comptia-security-plus-
practice-test-9-exam-sy0-501) practice-test-21-exam-sy0-501)
Security+ Practice Test 10 (/comptia-security-plus- Security+ Practice Test 22 (/comptia-security-plus-
practice-test-10-exam-sy0-501) practice-test-22-exam-sy0-501)
Security+ Practice Test 11 (/comptia-security-plus- Security+ Practice Test 23 (/comptia-security-plus-
practice-test-11-exam-sy0-501) practice-test-23-exam-sy0-501)
Security+ Practice Test 12 (/comptia-security-plus- Security+ Practice Test 24 (/comptia-security-plus-
practice-test-12-exam-sy0-501) practice-test-24-exam-sy0-501)
Exam Glossaries
https://www.examcompass.com/malware-quiz 17/18
1/11/2019 Malware Quiz - ExamCompass
https://www.examcompass.com/malware-quiz 18/18