Question: Which of the following types of malware disguises itself as a useful program but actually causes damage once installed?

Answer Choices: Worm

Trojan horse

Rootkit

Virus

Answer: Trojan horse

Question: Which of the following is an ethical hacker hired to identify security vulnerabilities in an organization’s systems?

Answer Choices: Black hat

White hat

Grey hat

Script kiddie

Answer: White hat

Question: Which type of hacker is typically motivated by financial gain or malicious intent?

Answer Choices: Black hat

White hat

Grey hat

Green hat

Answer: Black hat

Question: Which of the following is a fraudulent email that appears to be from a legitimate source but is designed to steal personal information?

Answer Choices: Spoofing

Phishing

Spamming

Spying

Answer: Phishing

Question: Which of the following is a self-replicating program that spreads without user intervention?

Answer Choices: Worm

Trojan horse

Rootkit

Spyware

Answer: Worm

Question: Which of the following is a type of attack in which a hacker floods a system with traffic to make it unavailable to users?

Answer Choices: Phishing attack

Man-in-the-middle attack

Denial-of-service attack

Spoofing attack

Answer: Denial-of-service attack

Question: What is the primary purpose of ransomware?

Answer Choices: To secretly monitor a user’s behavior

To block access to a system until a payment is made

To spread rapidly across a network

To corrupt or delete files

Answer: To block access to a system until a payment is made

Question: Which of the following attacks intercepts communication between two parties to steal or manipulate the data being transmitted?

Answer Choices: Man-in-the-middle attack

Denial-of-service attack

Spoofing attack

Social engineering attack

Answer: Man-in-the-middle attack

Question: Which of the following types of malware records every keystroke made by a user to steal passwords or other sensitive data?

Answer Choices: Worm

Spyware

Keylogger

Rootkit

Answer: Keylogger

Question: Which of the following disguises itself within legitimate software to gain control of a system without being detected?

Answer Choices: Trojan horse

Rootkit

Virus

Worm

Answer: Rootkit

Question: The primary difference between a virus and a worm is that:

Answer Choices: a virus self-replicates without attaching to files, while a worm attaches to files

a worm requires user action to spread, while a virus spreads automatically

a virus requires user action to spread, while a worm spreads automatically

a virus and worm are the same thing

Answer: a virus requires user action to spread, while a worm spreads automatically