Question: Which of the following types of malware disguises itself as a useful program but actually causes damage once installed?
Answer Choices: Worm
Trojan horse
Rootkit
Virus
Answer: Trojan horse
Question: Which of the following is an ethical hacker hired to identify security vulnerabilities in an organization’s systems?
Answer Choices: Black hat
White hat
Grey hat
Script kiddie
Answer: White hat
Question: Which type of hacker is typically motivated by financial gain or malicious intent?
Answer Choices: Black hat
White hat
Grey hat
Green hat
Answer: Black hat
Question: Which of the following is a fraudulent email that appears to be from a legitimate source but is designed to steal personal information?
Answer Choices: Spoofing
Phishing
Spamming
Spying
Answer: Phishing
Question: Which of the following is a self-replicating program that spreads without user intervention?
Answer Choices: Worm
Trojan horse
Rootkit
Spyware
Answer: Worm
Question: Which of the following is a type of attack in which a hacker floods a system with traffic to make it unavailable to users?
Answer Choices: Phishing attack
Man-in-the-middle attack
Denial-of-service attack
Spoofing attack
Answer: Denial-of-service attack
Question: What is the primary purpose of ransomware?
Answer Choices: To secretly monitor a user’s behavior
To block access to a system until a payment is made
To spread rapidly across a network
To corrupt or delete files
Answer: To block access to a system until a payment is made
Question: Which of the following attacks intercepts communication between two parties to steal or manipulate the data being transmitted?
Answer Choices: Man-in-the-middle attack
Denial-of-service attack
Spoofing attack
Social engineering attack
Answer: Man-in-the-middle attack
Question: Which of the following types of malware records every keystroke made by a user to steal passwords or other sensitive data?
Answer Choices: Worm
Spyware
Keylogger
Rootkit
Answer: Keylogger
Question: Which of the following disguises itself within legitimate software to gain control of a system without being detected?
Answer Choices: Trojan horse
Rootkit
Virus
Worm
Answer: Rootkit
Question: The primary difference between a virus and a worm is that:
Answer Choices: a virus self-replicates without attaching to files, while a worm attaches to files
a worm requires user action to spread, while a virus spreads automatically
a virus requires user action to spread, while a worm spreads automatically
a virus and worm are the same thing
Answer: a virus requires user action to spread, while a worm spreads automatically