Which malware type can self-replicate with the assistance of a host system?
A. trojan
B. virus
C. worm
D. bot
B. virus
The primary goal of crypto-malware is to _____.
A. encrypt files to obtain cryptocurrency
B. slow down computer processes
C. secretly mine information and data
D. share files with other people
A. encrypt files to obtain cryptocurrency
Software that is designed to intentionally cause harm to a device, server, or network is _____.
A. outware
B. loggerware
C. attackware
D. malware
D. malware
What OSI Layer does Transport Layer Security (TLS) operate on?
A. Layer 5
B. Layer 6
C. Layer 4
D. Layer 8
B. Layer 6
What does a password vault use for secure encryption?
A. AES-128
B. SHA-128
C. AES-256
D. SHA-256
C. AES-256
Which malware type can replicate itself without the help of a host system or human interaction?
A. trojan
B. virus
C. worm
D. bot
C. worm
Which of the following is a type of ransomware?
A. Locker
B. Scareware
C. Doxware
D. All of the above
D. All of the above
Some examples of malware include:
A. robots, viruses, and worms
B. trojans, worms, and bots
C. computerware, worms, and robots
D. worms, system kits, and loggerware
B. trojans, worms, and bots
What is SFTP used for?
A. Security file training
B. Security format transfer
C. Secure file transfer
D. Secure file transport
C. Secure file transfer
_____ chips are built into the motherboard and used with Full Disk Encryption.
A. TPM
B. PTM
C. TDM
D. PDM
A. TPM
A computer virus attaches to _____ in order to execute malicious code.
A. another virus
B. a file, document, or program
C. a worm
D. a firewall
B. a file, document, or program
Which of the following ransomware is typically Android-based?
A. Locker
B. Leakware
C. Extortion-ware
D. None of the above
A. Locker
Viruses and worms can affect a system by _____.
A. deleting hard drives
B. slowing down the system
C. improving system functions
D. producing fake applications
B. slowing down the system
A VPN is an example of a secure protocol.
A. True
B. False
B. False
What does EAP stand for?
A. Environmental Act of Protection
B. Employee Assistance Program
C. Extensible Authentication Protocol
D. Encryption Authentication and Privacy
C. Extensible Authentication Protocol
What is a positive result a virus can have?
A. upgrade the operating system
B. convert software into a new version
C. fix problems in a system
D. stop the virus from replicating
C. fix problems in a system
Which type of ransomware can lock your computer and flood it with pop-up windows?
A. Freezeware
B. Scareware
C. Ware-wolf
D. POPware
B. Scareware
One tool that hackers use to get sensitive information from victims is/are _____.
A. loggerware
B. keyloggers
C. robots
D. phishing
B. keyloggers
What is one of the most popular key exchange protocols?
A. Key Exchange Protocol
B. Diffie Hellman Protocol
C. Secure Exchange Protocol
D. Encryption Exchange Protocol
B. Diffie Hellman Protocol
EAP-FAST was a replacement for which of the following?
A. EAP-SLOW
B. LEAP
C. EAP-RSA
D. REAP
B. LEAP
What type of virus comes bundled with an application?
A. program virus
B. boot sector virus
C. script virus
D. macro virus
A. program virus
Which ransomware seeks out public officials and celebrities to exploit?
A. Scareware
B. Doxware
C. Freezeware
D. None of the above
B. Doxware
Malware is a combination of which two words?
A. malevolent and software
B. malignant and software
C. maladapted and software
D. malicious and software
D. malicious and software
Which of the following is a secure protocol?
A. HTTP
B. HTTPS
C. FTP
D. NTP
B. HTTPS
What does PAP stand for?
A. Point-against-point
B. Procedure and protection
C. Person against person
D. Password Authentication Protocol
D. Password Authentication Protocol