Malware that changes its binary pattern on specific dates at specific times to avoid detection is known as a (n):
A. armored virus
B. logic bomb
C. polymorphic virus
D. Trojan
Malware that changes its binary pattern on specific dates at specific times to avoid detection is known as a (n):
A. armored virus
B. logic bomb
C. polymorphic virus
D. Trojan
An employee reports work was being completed on a company-owned laptop using a public wireless hot-spot. A pop-up screen appeared, and the user closed the pop-up. Seconds later, the desktop background was changed to the image of a padlock with a message demanding immediate payment to recover the data. Which of the following types of malware MOST likely caused this issue?
A. Ransomware
B. Rootkit
C. Scareware
D. Spyware
An employee reports work was being completed on a company owned laptop using a public wireless hot-spot. A pop-up screen appeared and the user closed the pop-up. Seconds later the desktop background was changed to the image of a padlock with a message demanding immediate payment to recover the data. Which of the following types of malware MOST likely caused this issue?
A. Ransomware
B. Rootkit
C. Scareware
D. Spyware
Which of the following types of malware, attempts to circumvent malware detection by trying to hide its true location on the infected system?
A. Armored virus
B. Ransomware
C. Trojan
D. Keylogger
During a routine configuration audit, a systems administrator determines that a former employee placed an executable on an application server. Once the system was isolated and diagnosed, it was determined that the executable was programmed to establish a connection to a malicious command and control server. Which of the following forms of malware is best described in the scenario?
A. Logic bomb
B. Rootkit
C. Back door
D. Ransomware
Which of the following BEST describes malware that tracks a user’s web browsing habits and injects the attacker’s advertisements into unrelated web pages? (Select TWO)
A. Logic bomb
B. Backdoor
C. Ransomware
D. Adware
E. Botnet
F. Spyware
A network technician at a company, Joe is working on a network device. He creates a rule to prevent users from connecting to a toy website during the holiday shopping season. This website is blacklisted and is known to have SQL injections and malware. Which of the following has been implemented?
A. Mandatory access
B. Network separation
C. Firewall rules
D. Implicit Deny
Which of the following types of malware is designed to provide access to a system when normal authentication fails?
A. Rootkit
B. Botnet
C. Backdoor
D. Adware
A Windows- based computer is infected with malware and is running too slowly to boot and run a malware scanner. Which of the following is the BEST way to run the malware scanner?
A. Kill all system processes
B. Enable the firewall
C. Boot from CD/USB
D. Disable the network connection
A workstation is exhibiting symptoms of malware and the network security analyst has decided to remove the system from the network. This represents which of the following stages of the Incident Handling Response?
A. Plan of action
B. Mitigation
C. Lesson Learned
D. Recovery